First published: Fri Aug 31 2012(Updated: )
Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to an unbuffered stream such as stderr.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
musl | <=0.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2114 has been assigned a medium severity rating due to its potential to cause denial of service and execute arbitrary code.
CVE-2012-2114 affects musl versions before 0.8.8 that utilize fprintf with unbuffered streams.
To fix CVE-2012-2114, you should upgrade musl to version 0.8.8 or later.
CVE-2012-2114 is a stack-based buffer overflow vulnerability.
Attackers can leverage CVE-2012-2114 to cause a denial of service or potentially execute arbitrary code.