First published: Fri Sep 07 2012(Updated: )
An integer overflow, leading to buffer overflow flaw was found in the way the implementation of strcoll() routine, used to compare two strings based on the current locale, of glibc, the GNU libc libraries, performed calculation of memory requirements / allocation, needed for storage of the strings. If an application linked against glibc was missing an application-level sanity checks for validity of strcoll() arguments and accepted untrusted input, an attacker could use this flaw to cause the particular application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Upstream bug report (including reproducer): [1] <a href="http://sourceware.org/bugzilla/show_bug.cgi?id=14547">http://sourceware.org/bugzilla/show_bug.cgi?id=14547</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <=2.17 | |
GNU C Library (glibc) | =2.0 | |
GNU C Library (glibc) | =2.0.1 | |
GNU C Library (glibc) | =2.0.2 | |
GNU C Library (glibc) | =2.0.3 | |
GNU C Library (glibc) | =2.0.4 | |
GNU C Library (glibc) | =2.0.5 | |
GNU C Library (glibc) | =2.0.6 | |
GNU C Library (glibc) | =2.1 | |
GNU C Library (glibc) | =2.1.1 | |
GNU C Library (glibc) | =2.1.1.6 | |
GNU C Library (glibc) | =2.1.2 | |
GNU C Library (glibc) | =2.1.3 | |
GNU C Library (glibc) | =2.1.9 | |
GNU C Library (glibc) | =2.10.1 | |
GNU C Library (glibc) | =2.11 | |
GNU C Library (glibc) | =2.11.1 | |
GNU C Library (glibc) | =2.11.2 | |
GNU C Library (glibc) | =2.11.3 | |
GNU C Library (glibc) | =2.12.1 | |
GNU C Library (glibc) | =2.12.2 | |
GNU C Library (glibc) | =2.13 | |
GNU C Library (glibc) | =2.14 | |
GNU C Library (glibc) | =2.14.1 | |
GNU C Library (glibc) | =2.15 | |
GNU C Library (glibc) | =2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4412 has a high severity rating due to the potential for remote code execution through a buffer overflow.
To fix CVE-2012-4412, upgrade to a version of glibc that is higher than 2.17.
CVE-2012-4412 affects glibc versions from 2.0 up to and including 2.17.
Systems affected by CVE-2012-4412 may experience a buffer overflow, which can lead to arbitrary code execution.
CVE-2012-4412 is primarily a remote vulnerability that can be exploited over a network.