Vulnerability Name: | CVE-2011-1071 (CCN-65671) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2010-08-05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2010-08-05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
4.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: MITRE Type: CNA CVE-2011-1071 Source: CCN Type: VMSA-2011-0010 VMware ESX third party updates for Service Console Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2011-0412 Important: glibc security update Source: CCN Type: RHSA-2011-0413 Important: glibc security update Source: CCN Type: RHSA-2012-0125 Moderate: glibc security and bug fix update Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: SA43492 GNU C Library fnmatch() Stack Corruption Vulnerability Source: CCN Type: SA45467 VMware ESX Console OS (COS) Multiple Vulnerabilities Source: CCN Type: SA46397 VMware ESX / ESXi Server Multiple Vulnerabilities Source: CCN Type: SA53166 Avaya Communication Manager OpenSSL and glibc Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Sources Bugzilla Bug 11883 fnmatch() alloca() abuse, with security consequence Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GNU C Library Web page GNC C Library - GNU Project - Free Software Foundation (FSF) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OSVDB ID: 72100 GNU C Library (glibc) posix/fnmatch.c fnmatch() Function Overflow DoS Source: CCN Type: OSVDB ID: 72796 GNU C Library (glibc) fnmatch() Function UTF8 String Handling Stack Corruption Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-46563 GNU glibc 'fnmatch()' Function Stack Corruption Vulnerability Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Patch secalert@redhat.com Source: CCN Type: ASA-2012-155 glibc security and bug fix update (RHSA-2012-0125) Source: XF Type: UNKNOWN gnuclibrary-fnmatch-code-execution(65671) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-25-2011] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |