Gnu

Glibc

165 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.7%
  • Veröffentlicht 24.02.2015 15:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive ...

  • EPSS 3.15%
  • Veröffentlicht 24.02.2015 15:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigge...

Exploit
  • EPSS 86.66%
  • Veröffentlicht 28.01.2015 19:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 fu...

Exploit
  • EPSS 7.19%
  • Veröffentlicht 05.12.2014 16:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937,...

Exploit
  • EPSS 1.18%
  • Veröffentlicht 05.12.2014 16:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to ...

  • EPSS 0.16%
  • Veröffentlicht 24.11.2014 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

Exploit
  • EPSS 3.35%
  • Veröffentlicht 27.10.2014 20:55:22
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy...

Exploit
  • EPSS 1.64%
  • Veröffentlicht 06.10.2014 23:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

  • EPSS 21.51%
  • Veröffentlicht 29.08.2014 16:55:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment vari...

  • EPSS 0.78%
  • Veröffentlicht 29.07.2014 14:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG...