Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and previous versions allow context-dependent malicious users to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to CVE-2008-1391.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 2.2.2 |
||
gnu glibc 2.9 |
||
gnu glibc 2.7 |
||
gnu glibc 2.1.2 |
||
gnu glibc 2.0.5 |
||
gnu glibc |
||
gnu glibc 2.2.5 |
||
gnu glibc 2.0.6 |
||
gnu glibc 2.1.1 |
||
gnu glibc 2.0.3 |
||
gnu glibc 2.3.1 |
||
gnu glibc 2.3 |
||
gnu glibc 2.0 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 2.3.10 |
||
gnu glibc 2.4 |
||
gnu glibc 2.1 |
||
gnu glibc 2.3.4 |
||
gnu glibc 2.1.9 |
||
gnu glibc 2.3.3 |
||
gnu glibc 2.6.1 |
||
gnu glibc 2.0.1 |
||
gnu glibc 2.10 |
||
gnu glibc 2.5.1 |
||
gnu glibc 2.6 |
||
gnu glibc 2.0.4 |
||
gnu glibc 2.0.2 |
||
gnu glibc 2.2.1 |
||
gnu glibc 2.3.2 |
||
gnu glibc 2.3.6 |
||
gnu glibc 2.2.3 |
||
gnu glibc 2.5 |
||
gnu glibc 2.3.5 |
||
gnu glibc 2.8 |
||
gnu glibc 2.2.4 |
||
gnu glibc 2.1.3 |
||
gnu glibc 2.2 |