CVE-2012-0864 – glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow
https://notcve.org/view.php?id=CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. Desbordamiento de enteros en la función vfprint en stdio-common/vfprint.c en glibc v2.14 y otras versiones que permite a isiarios dependientes del contexto eludir el mecanismo de protección FORTIFY_SOURCE, llevar a cabo ataques de cadena de formato y escribir de forma arbitraria en memoria a través de un gran número de argumentos. • http://rhn.redhat.com/errata/RHSA-2012-0393.html http://rhn.redhat.com/errata/RHSA-2012-0397.html http://rhn.redhat.com/errata/RHSA-2012-0488.html http://rhn.redhat.com/errata/RHSA-2012-0531.html http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=7c1f4834d398163d1ac8101e35e9c36fc3176e6e http://sourceware.org/ml/libc-alpha/2012-02/msg00023.html http://www.phrack.org/issues.html?issue=67&id=9#article http://www.securityfocus.com/bid/52201 https://bugzilla.redhat.com/ • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2011-2702 – eGlibc - Signedness Code Execution
https://notcve.org/view.php?id=CVE-2011-2702
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function. Error de signo de enteros en Glibc anterior a 2.13 y eglibc anterior a 2.13, cuando utiliza la optimización Supplemental Streaming SIMD Extensions 3 (SSSE3), permite a atacantes dependientes de contexto ejecutar código arbitrario a través de un parámetro de longitud negativo en (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, o (3) memset-sse2.S en sysdeps/i386/i686/multiarch/, lo que provoca una lectura fuera de rango, tal y como fue demostrado mediante el uso de la función memcpy. A patch introduced a signedness bug causing any program compiled against the vulnerable version of eglibc and using optimized functions such as memcpy_ssse3 and memcpy-ssse3-back to be potentially vulnerable to unexpected code execution. • https://www.exploit-db.com/exploits/20167 http://seclists.org/oss-sec/2011/q3/123 http://seclists.org/oss-sec/2011/q3/153 http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032 http://www.nodefense.org/eglibc.txt http://www.osvdb.org/80718 http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue https://bugzilla.novell.com/show_bug.cgi?id=706915 https://sourceware.org/git/?p=glibc.git%3Ba=commi • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2011-4609 – glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
https://notcve.org/view.php?id=CVE-2011-4609
The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections. La función svc_run en la implementación RPC en glibc anterior a v2.15 que permite a atacantes remotos causar una denegación de servicios (consumo de CPU) a través de una gran número de conexiones RPC. • https://bugzilla.redhat.com/show_bug.cgi?id=767299 https://access.redhat.com/security/cve/CVE-2011-4609 • CWE-399: Resource Management Errors •
CVE-2009-5029 – GNU glibc - Timezone Parsing Remote Integer Overflow
https://notcve.org/view.php?id=CVE-2009-5029
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd. Desbordamiento de entero en la función __tzfile_read en glibc anterior a v2.15 que permite a atacantes dependientes del contexto causar una denegación de servicios (caída) y posiblemente ejecutar código arbitrario a través de un fichero timezone (TZ), como se demostró usando vsftpd. • https://www.exploit-db.com/exploits/36404 http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2 http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html https://bugzilla.redhat.com/show_bug.cgi?id=761245 https://access.redhat.com/security/cve/CVE-2009-5029 • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2011-1095 – glibc: insufficient quoting in the locale command output
https://notcve.org/view.php?id=CVE-2011-1095
locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function. locale/programs/locale.c en la librería C GNU (también conocido como glibc o libc6) anterior a v2.13 no formatea su salida, permitiendo a usuarios locales ganar privilegios mediante una variable de entorno localization manipulada, junto con un programa que ejecuta un script que usa la función eval. • http://bugs.gentoo.org/show_bug.cgi?id=330923 http://openwall.com/lists/oss-security/2011/03/08/21 http://openwall.com/lists/oss-security/2011/03/08/22 http://openwall.com/lists/oss-security/2011/03/08/8 http://secunia.com/advisories/43830 http://secunia.com/advisories/43976 http://secunia.com/advisories/43989 http://secunia.com/advisories/46397 http://security.gentoo.org/glsa/glsa-201011-01.xml http://securitytracker.com/id?1025286 http://sources.redhat • CWE-264: Permissions, Privileges, and Access Controls •