Gnu

Glibc

157 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.76%
  • Veröffentlicht 09.10.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_mema...

Exploit
  • EPSS 7.56%
  • Veröffentlicht 04.10.2013 17:55:09
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control e...

Exploit
  • EPSS 3.04%
  • Veröffentlicht 02.05.2013 14:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory v...

Exploit
  • EPSS 5.11%
  • Veröffentlicht 02.05.2013 14:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.

  • EPSS 0.47%
  • Veröffentlicht 02.05.2013 14:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

  • EPSS 3.4%
  • Veröffentlicht 29.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that trigg...

  • EPSS 2.11%
  • Veröffentlicht 08.02.2013 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyt...

  • EPSS 0.2%
  • Veröffentlicht 25.08.2012 10:29:51
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and...

  • EPSS 0.09%
  • Veröffentlicht 10.04.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonst...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 10.04.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that e...