First published: Wed Apr 03 2013(Updated: )
A stack (frame) overflow flaw, leading to denial of service (application crash), was found in the way getaddrinfo() routine (returning a list of address structures for particular request) of glibc, the collection of GNU libc libraries, processed certain requests. If an application linked against glibc accepted untrusted getaddrinfo() input remotely, a remote attacker could issue a specially-crafted request, which once processed would lead to that application crash. References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=813121">https://bugzilla.novell.com/show_bug.cgi?id=813121</a> [2] <a href="http://www.openwall.com/lists/oss-security/2013/04/03/2">http://www.openwall.com/lists/oss-security/2013/04/03/2</a> Proposed Novell patch: [3] <a href="http://bugzillafiles.novell.org/attachment.cgi?id=533210">http://bugzillafiles.novell.org/attachment.cgi?id=533210</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | <=2.17 | |
GNU C Library | =2.0.1 | |
GNU C Library | =2.0.6 | |
GNU C Library | =2.2 | |
GNU C Library | =2.2.1 | |
GNU C Library | =2.2.2 | |
GNU C Library | =2.2.3 | |
GNU C Library | =2.2.4 | |
GNU C Library | =2.2.5 | |
GNU C Library | =2.3 | |
GNU C Library | =2.3.1 | |
GNU C Library | =2.3.2 | |
GNU C Library | =2.3.3 | |
GNU C Library | =2.3.4 | |
GNU C Library | =2.3.5 | |
GNU C Library | =2.3.6 | |
GNU C Library | =2.4 | |
GNU C Library | =2.5 | |
GNU C Library | =2.5.1 | |
GNU C Library | =2.6 | |
GNU C Library | =2.6.1 | |
GNU C Library | =2.7 | |
GNU C Library | =2.8 | |
GNU C Library | =2.9 | |
GNU C Library | =2.10.1 | |
GNU C Library | =2.11 | |
GNU C Library | =2.11.1 | |
GNU C Library | =2.11.2 | |
GNU C Library | =2.11.3 | |
GNU C Library | =2.12.1 | |
GNU C Library | =2.12.2 | |
GNU C Library | =2.13 | |
GNU C Library | =2.14 | |
GNU C Library | =2.14.1 | |
GNU C Library | =2.15 | |
GNU C Library | =2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1914 has a severity rating of medium, primarily impacting systems that use vulnerable versions of the GNU C Library (glibc).
To fix CVE-2013-1914, update to a version of glibc that is higher than 2.17 or apply the appropriate security patch provided by your Linux distribution.
CVE-2013-1914 affects glibc versions up to and including 2.17, along with several earlier versions starting from 2.0.1.
CVE-2013-1914 is classified as a stack overflow vulnerability that can lead to application crashes and denial of service.
Yes, CVE-2013-1914 can be exploited remotely if an application that uses the vulnerable glibc function is not properly secured.