First published: Thu Aug 05 2010(Updated: )
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.2.2 | |
GNU glibc | =2.9 | |
GNU glibc | =2.7 | |
GNU glibc | =2.1.2 | |
GNU glibc | =2.11 | |
GNU glibc | =2.0.5 | |
GNU glibc | =2.2.5 | |
GNU glibc | =2.0.6 | |
GNU glibc | =2.10.1 | |
GNU glibc | =1.00 | |
GNU glibc | =1.06 | |
GNU glibc | =2.1.1 | |
GNU glibc | =1.02 | |
GNU glibc | =2.0.3 | |
GNU glibc | =1.07 | |
GNU glibc | =2.3.1 | |
GNU glibc | =2.3 | |
GNU glibc | =2.12.0 | |
GNU glibc | =2.0 | |
GNU glibc | <=2.13 | |
GNU glibc | =2.1.1.6 | |
GNU glibc | =1.04 | |
GNU glibc | =1.01 | |
GNU glibc | =2.3.10 | |
GNU glibc | =2.4 | |
GNU glibc | =2.1 | |
GNU glibc | =2.3.4 | |
GNU glibc | =1.09.1 | |
GNU glibc | =2.1.9 | |
GNU glibc | =2.3.3 | |
GNU glibc | =2.12.1 | |
GNU glibc | =2.6.1 | |
GNU glibc | =2.0.1 | |
GNU glibc | =1.09 | |
GNU glibc | =2.10 | |
GNU glibc | =2.11.2 | |
GNU glibc | =2.5.1 | |
GNU glibc | =2.6 | |
GNU glibc | =2.0.4 | |
GNU glibc | =2.0.2 | |
GNU glibc | =2.2.1 | |
GNU glibc | =2.3.2 | |
GNU glibc | =1.03 | |
GNU glibc | =2.1.3.10 | |
GNU glibc | =2.3.6 | |
GNU glibc | =2.2.3 | |
GNU glibc | =2.5 | |
GNU glibc | =2.11.3 | |
GNU glibc | =1.08 | |
GNU glibc | =2.3.5 | |
GNU glibc | =2.8 | |
GNU glibc | =2.11.1 | |
GNU glibc | =2.2.4 | |
GNU glibc | =2.1.3 | |
GNU glibc | =1.05 | |
GNU glibc | =2.2 | |
GNU glibc | =2.12.2 | |
GNU glibc | =2.10.2 | |
redhat/glibc | <0:2.5-58.el5_6.2 | 0:2.5-58.el5_6.2 |
redhat/glibc | <0:2.12-1.7.el6_0.5 | 0:2.12-1.7.el6_0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)