First published: Mon Dec 24 2012(Updated: )
An integer overflow leading to a heap-based buffer overflow was found in the way grep, A utility used to search through textual input for lines which contain a match to a specified pattern, parsed large lines of data. This flaw could use used to crash grep or potentially execute arbitrary code, if a local user was tricked into running grep on a specially crafted data file. Patch: <a href="http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189">http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189</a> Reference: <a href="http://seclists.org/oss-sec/2012/q4/504">http://seclists.org/oss-sec/2012/q4/504</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grep | <2.11 | 2.11 |
Grep | <=2.10 | |
Grep | =2.2 | |
Grep | =2.3 | |
Grep | =2.4 | |
Grep | =2.4.1 | |
Grep | =2.4.2 | |
Grep | =2.5 | |
Grep | =2.5.1 | |
Grep | =2.5.1-a | |
Grep | =2.5.3 | |
Grep | =2.5.4 | |
Grep | =2.6 | |
Grep | =2.6.1 | |
Grep | =2.6.2 | |
Grep | =2.6.3 | |
Grep | =2.7 | |
Grep | =2.8 | |
Grep | =2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5667 has a severity rating that suggests it can lead to a heap-based buffer overflow, potentially allowing for arbitrary code execution.
To mitigate CVE-2012-5667, users should upgrade to grep version 2.11 or later.
Grep versions prior to 2.11, including but not limited to versions 2.2 through 2.10, are impacted by CVE-2012-5667.
CVE-2012-5667 can cause grep to crash and may permit the execution of arbitrary code, posing a significant security risk.
It is not safe to use grep versions prior to 2.11 as they are vulnerable to exploitation via CVE-2012-5667.