First published: Thu Sep 03 2009(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2009-4880">CVE-2009-4880</a> to the following vulnerability: Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and earlier allow context-dependent attackers to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to <a href="https://access.redhat.com/security/cve/CVE-2008-1391">CVE-2008-1391</a>. References: [1] <a href="http://securityreason.com/achievement_securityalert/67">http://securityreason.com/achievement_securityalert/67</a> [2] <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED NOTABUG - CVE-2008-1391 glibc: strfmon format string problem" href="show_bug.cgi?id=524671">https://bugzilla.redhat.com/show_bug.cgi?id=524671</a> [3] <a href="http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600">http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600</a> [4] <a href="http://sourceware.org/git/?p=glibc.git;a=commit;h=199eb0de8d673fb23aa127721054b4f1803d61f3">http://sourceware.org/git/?p=glibc.git;a=commit;h=199eb0de8d673fb23aa127721054b4f1803d61f3</a> [5] <a href="http://www.ubuntu.com/usn/USN-944-1">http://www.ubuntu.com/usn/USN-944-1</a> [6] <a href="http://www.securityfocus.com/bid/36443">http://www.securityfocus.com/bid/36443</a> [7] <a href="http://secunia.com/advisories/39900">http://secunia.com/advisories/39900</a> [8] <a href="http://www.vupen.com/english/advisories/2010/1246">http://www.vupen.com/english/advisories/2010/1246</a> Public PoC (from [3]): [cx@localhost ~]$ php -r 'money_format("%.1073741821i",1);' Segmentation fault
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.10.1 | |
GNU glibc | =2.0 | |
GNU glibc | =2.0.1 | |
GNU glibc | =2.0.2 | |
GNU glibc | =2.0.3 | |
GNU glibc | =2.0.4 | |
GNU glibc | =2.0.5 | |
GNU glibc | =2.0.6 | |
GNU glibc | =2.1 | |
GNU glibc | =2.1.1 | |
GNU glibc | =2.1.1.6 | |
GNU glibc | =2.1.2 | |
GNU glibc | =2.1.3 | |
GNU glibc | =2.1.9 | |
GNU glibc | =2.2 | |
GNU glibc | =2.2.1 | |
GNU glibc | =2.2.2 | |
GNU glibc | =2.2.3 | |
GNU glibc | =2.2.4 | |
GNU glibc | =2.2.5 | |
GNU glibc | =2.3 | |
GNU glibc | =2.3.1 | |
GNU glibc | =2.3.2 | |
GNU glibc | =2.3.3 | |
GNU glibc | =2.3.4 | |
GNU glibc | =2.3.5 | |
GNU glibc | =2.3.6 | |
GNU glibc | =2.3.10 | |
GNU glibc | =2.4 | |
GNU glibc | =2.5 | |
GNU glibc | =2.5.1 | |
GNU glibc | =2.6 | |
GNU glibc | =2.6.1 | |
GNU glibc | =2.7 | |
GNU glibc | =2.8 | |
GNU glibc | =2.9 | |
GNU glibc | =2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.