Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent malicious users to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 2.14 |