First published: Fri Feb 17 2012(Updated: )
In the Phrack article "A Eulogy for Format Strings", a researcher using nickname "Captain Planet" reported an integer overflow flaw in the format string protection mechanism offered by FORTIFY_SOURCE. A remote attacker could provide a specially crafted executable, leading to FORTIFY_SOURCE format string protection mechanism bypass, when executed. References: <a href="http://www.phrack.org/issues.html?issue=67&id=9#article">http://www.phrack.org/issues.html?issue=67&id=9#article</a> Upstream bug and Kees Cook's proposed patches: <a href="http://sourceware.org/bugzilla/show_bug.cgi?id=13656">http://sourceware.org/bugzilla/show_bug.cgi?id=13656</a> <a href="http://sourceware.org/ml/libc-alpha/2012-02/msg00023.html">http://sourceware.org/ml/libc-alpha/2012-02/msg00023.html</a> <a href="http://sourceware.org/ml/libc-alpha/2012-02/msg00012.html">http://sourceware.org/ml/libc-alpha/2012-02/msg00012.html</a> <a href="http://sourceware.org/ml/libc-alpha/2012-02/msg00073.html">http://sourceware.org/ml/libc-alpha/2012-02/msg00073.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.