4.4
CVSSv2

CVE-2012-5667

Published: 03/01/2013 Updated: 07/11/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in GNU Grep prior to 2.11 might allow context-dependent malicious users to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu grep 2.4.2

gnu grep 2.5.1

gnu grep 2.2

gnu grep 2.4

gnu grep

gnu grep 2.9

gnu grep 2.6.1

gnu grep 2.6.3

gnu grep 2.5.4

gnu grep 2.4.1

gnu grep 2.7

gnu grep 2.3

gnu grep 2.5.3

gnu grep 2.6.2

gnu grep 2.5

gnu grep 2.8

gnu grep 2.6

Vendor Advisories

Debian Bug report logs - #701897 CVE-2012-5667: buffer overflow with overly long input lines Package: grep; Maintainer for grep is Anibal Monsalve Salazar <anibal@debianorg>; Source for grep is src:grep (PTS, buildd, popcon) Reported by: Raphael Geissert <geissert@debianorg> Date: Thu, 28 Feb 2013 15:57:05 UTC Sev ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep (CVE-2012-5667) A heap-ba ...

Exploits

Grep <211 is vulnerable to int overflow exploitation listsgnuorg/archive/html/bug-grep/2012-03/msg00007html Although it is patched in the recent Grep, This update has not been pushed to the Ubuntu repos, or the Redhat repos, leaving 99% of those OS's(and more) vulnerable There are also many other ways to do this bug It is low ...
Grep versions prior to 211 suffer from an integer overflow vulnerability ...