6.4
CVSSv2

CVE-2015-8776

Published: 19/04/2016 Updated: 30/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The strftime function in the GNU C Library (aka glibc or libc6) prior to 2.23 allows context-dependent malicious users to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.

Vulnerable Product Search on Vulmon Subscribe to Product

suse linux enterprise software development kit 11

suse linux enterprise desktop 12

suse linux enterprise debuginfo 11

suse linux enterprise server 11

suse linux enterprise software development kit 12

suse suse linux enterprise server 12

opensuse opensuse 13.2

suse linux enterprise desktop 11

suse linux enterprise server 12

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.10

debian debian linux 8.0

fedoraproject fedora 23

gnu glibc

Vendor Advisories

Synopsis Moderate: glibc security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for glibc is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base s ...
Several security issues were fixed in the GNU C Library ...
USN-2985-1 introduced a regression in the GNU C Library ...
Several vulnerabilities have been fixed in the GNU C Library, glibc The first vulnerability listed below is considered to have critical impact CVE-2015-7547 The Google Security Team and Red Hat discovered that the glibc host name resolver function, getaddrinfo, when processing AF_UNSPEC queries (for dual A/AAAA lookups), could misman ...
Debian Bug report logs - #813187 glibc: CVE-2014-9761: Unbounded stack allocation in nan* functions Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 30 Jan 2016 09:33:11 UTC Severity: normal Tags: fix ...
Debian Bug report logs - #812441 glibc: CVE-2015-8778: Integer overflow in hcreate and hcreate_r Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 23 Jan 2016 23:36:02 UTC Severity: important Tags: fix ...
Debian Bug report logs - #812445 glibc: CVE-2015-8776: Segmentation fault caused by passing out-of-range data to strftime() Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 23 Jan 2016 23:42:02 UTC Se ...
Debian Bug report logs - #812455 glibc: CVE-2015-8779: Unbounded stack allocation in catopen function Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 24 Jan 2016 00:45:01 UTC Severity: important Tags ...
Unbounded stack allocation in catopen functionA stack based buffer overflow vulnerability was found in the catopen() function An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code(CVE-2015-8779) Integer overflow in hcreate and hcreate_rAn integer overflow vulnerability was found in hcrea ...