6.8
CVSSv2

CVE-2015-8983

Published: 20/03/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) prior to 2.22 allows context-dependent malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc

Vendor Advisories

USN-3239-1 introduced a regression in the GNU C Library ...
Several security issues were fixed in the GNU C Library ...
USN-3239-1 introduced a regression in the GNU C Library ...