Gnu

Glibc

152 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.43%
  • Veröffentlicht 29.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that trigg...

  • EPSS 2.7%
  • Veröffentlicht 08.02.2013 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyt...

  • EPSS 0.2%
  • Veröffentlicht 25.08.2012 10:29:51
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and...

  • EPSS 0.09%
  • Veröffentlicht 10.04.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonst...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 10.04.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that e...

  • EPSS 0.12%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary director...

Exploit
  • EPSS 2.48%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted p...

Exploit
  • EPSS 6.78%
  • Veröffentlicht 08.04.2011 15:17:27
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka...

  • EPSS 0.87%
  • Veröffentlicht 08.04.2011 15:17:26
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 30.03.2011 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor s...