5
CVSSv2

CVE-2011-4609

Published: 02/05/2013 Updated: 03/05/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc 2.0.3

gnu glibc 2.0.2

gnu glibc 2.0.1

gnu glibc 2.0

gnu glibc 2.1.9

gnu glibc 2.1.3

gnu glibc 2.1.2

gnu glibc 2.1.1.6

gnu glibc 2.1.1

gnu glibc 2.13

gnu glibc 2.0.6

gnu glibc 2.0.4

gnu glibc

gnu glibc 2.1

gnu glibc 2.0.5

Vendor Advisories

Multiple vulnerabilities were discovered and fixed in the GNU C Library ...
Synopsis Moderate: glibc security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated glibc packages that fix multiple security issues and one bug arenow available for Red Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact ...
Synopsis Moderate: glibc security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated glibc packages that fix two security issues and three bugs are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact ...
Synopsis Moderate: glibc security update Type/Severity Security Advisory: Moderate Topic Updated glibc packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the glibc library read timezone files If a carefully-crafted timezone file was loaded by an application linked against glibc, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application ...