Gnu

Glibc

157 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.68%
  • Veröffentlicht 19.04.2016 21:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

  • EPSS 7.41%
  • Veröffentlicht 19.04.2016 21:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.

  • EPSS 9.81%
  • Veröffentlicht 19.04.2016 21:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which tri...

  • EPSS 3.82%
  • Veröffentlicht 19.04.2016 21:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) ...

  • EPSS 93.91%
  • Veröffentlicht 18.02.2016 21:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrar...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 20.01.2016 05:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

  • EPSS 0.1%
  • Veröffentlicht 17.12.2015 19:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS...

  • EPSS 7.3%
  • Veröffentlicht 28.09.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS respo...

  • EPSS 0.83%
  • Veröffentlicht 26.08.2015 19:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demon...

  • EPSS 0.45%
  • Veröffentlicht 08.04.2015 10:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers t...