Gnu

Glibc

152 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 27.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).

  • EPSS 7.81%
  • Veröffentlicht 19.06.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made t...

  • EPSS 0.68%
  • Veröffentlicht 12.06.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.

  • EPSS 3.76%
  • Veröffentlicht 07.05.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an ove...

  • EPSS 0.52%
  • Veröffentlicht 20.03.2017 16:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vec...

  • EPSS 0.76%
  • Veröffentlicht 20.03.2017 16:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.

  • EPSS 0.15%
  • Veröffentlicht 20.03.2017 16:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

  • EPSS 1.31%
  • Veröffentlicht 15.03.2017 19:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based ...

  • EPSS 0.53%
  • Veröffentlicht 02.03.2017 01:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte i...

  • EPSS 1.19%
  • Veröffentlicht 17.02.2017 02:59:13
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initializat...