5
CVSSv2

CVE-2009-4880

Published: 01/06/2010 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and previous versions allow context-dependent malicious users to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to CVE-2008-1391.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc 2.2.2

gnu glibc 2.9

gnu glibc 2.7

gnu glibc 2.1.2

gnu glibc 2.0.5

gnu glibc

gnu glibc 2.2.5

gnu glibc 2.0.6

gnu glibc 2.1.1

gnu glibc 2.0.3

gnu glibc 2.3.1

gnu glibc 2.3

gnu glibc 2.0

gnu glibc 2.1.1.6

gnu glibc 2.3.10

gnu glibc 2.4

gnu glibc 2.1

gnu glibc 2.3.4

gnu glibc 2.1.9

gnu glibc 2.3.3

gnu glibc 2.6.1

gnu glibc 2.0.1

gnu glibc 2.10

gnu glibc 2.5.1

gnu glibc 2.6

gnu glibc 2.0.4

gnu glibc 2.0.2

gnu glibc 2.2.1

gnu glibc 2.3.2

gnu glibc 2.3.6

gnu glibc 2.2.3

gnu glibc 2.5

gnu glibc 2.3.5

gnu glibc 2.8

gnu glibc 2.2.4

gnu glibc 2.1.3

gnu glibc 2.2

Exploits

source: wwwsecurityfocuscom/bid/36443/info GNU glibc is prone to an integer-overflow weakness An attacker can exploit this issue through other applications such as PHP to execute arbitrary code within the context of the affected application Failed exploit attempts will result in a denial-of-service condition GNU glibc 2101 and prio ...