Vulnerability Name: | CVE-2012-0864 (CCN-73547) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2010-11-17 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2010-11-17 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)
5.3 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-0864 Source: CCN Type: RHSA-2012-0393 Moderate: glibc security and bug fix update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2012-0397 Moderate: glibc security update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2012-0488 Important: rhev-hypervisor5 security and bug fix update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2012-0531 Important: rhev-hypervisor6 security and bug fix update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SA51555 VMware ESXi glibc Multiple Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: CCN Type: GNU C Library Web page GNU C Library Source: CCN Type: OSVDB ID: 79705 GNU C Library (glibc) Format String Protection Bypass nargs Parsing Overflow Source: CCN Type: OSVDB ID: 80719 GNU C Library (glibc) vfprintf() Implementation FORTIFY_SOURCE Function Local Overflow Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: CCN Type: BID-52201 GNU glibc 'nargs' Integer Overflow Security Bypass Vulnerability Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: CCN Type: VMSA-2012-0018 VMware security updates for vCSA and ESXi Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 794797 CVE-2012-0864 glibc: F_S format string protection bypass via "nargs" integer overflow [fedora-all] Source: XF Type: UNKNOWN glibc-nargs-security-bypass(73547) Source: CCN Type: Packet Storm Security [05-01-2013] sudo 1.8.3p1 Local Root | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |