|
|
Subscribe / Log in / New account

glibc: code execution

Package(s):glibc CVE #(s):CVE-2012-3480
Created:August 20, 2012 Updated:August 28, 2012
Description: From the Red Hat bugzilla:

Multiple integer overflows, leading to stack-based buffer overflows were found in various stdlib functions of GNU libc (strtod, strtof, strtold, strtod_l and related routines). If an application, using the affected stdlib functions, did not perform user-level sanitization of provided inputs, a local attacker could use this flaw to cause such an application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

Alerts:
Debian-LTS DLA-165-1 eglibc 2015-03-06
Gentoo 201503-04 glibc 2015-03-08
Mandriva MDVSA-2013:162 glibc 2013-05-07
Ubuntu USN-1589-2 glibc 2012-12-17
Ubuntu USN-1589-1 eglibc, glibc 2012-10-01
Scientific Linux SL-glib-20120827 glibc 2012-08-27
Scientific Linux SL-glib-20120827 glibc 2012-08-27
Oracle ELSA-2012-1207 glibc 2012-08-27
Oracle ELSA-2012-1208 glibc 2012-08-27
Fedora FEDORA-2012-11928 glibc 2012-08-27
CentOS CESA-2012:1208 glibc 2012-08-27
CentOS CESA-2012:1207 glibc 2012-08-27
Red Hat RHSA-2012:1207-01 glibc 2012-08-27
Red Hat RHSA-2012:1208-01 glibc 2012-08-27
Fedora FEDORA-2012-11927 glibc 2012-08-18

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds