Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 2.12.2 |
||
gnu glibc 2.12.1 |
||
gnu glibc 2.1.2 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 2.0.2 |
||
gnu glibc 2.0.1 |
||
gnu glibc 2.15 |
||
gnu glibc 2.14.1 |
||
gnu glibc 2.11.1 |
||
gnu glibc 2.11 |
||
gnu glibc 2.10.1 |
||
gnu glibc 2.0.6 |
||
gnu glibc 2.0.5 |
||
gnu glibc |
||
gnu glibc 2.16 |
||
gnu glibc 2.11.3 |
||
gnu glibc 2.11.2 |
||
gnu glibc 2.1.1 |
||
gnu glibc 2.1 |
||
gnu glibc 2.0 |
||
gnu glibc 2.14 |
||
gnu glibc 2.13 |
||
gnu glibc 2.1.9 |
||
gnu glibc 2.1.3 |
||
gnu glibc 2.0.4 |
||
gnu glibc 2.0.3 |