First published: Wed Mar 15 2017(Updated: )
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <=2.20 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8982 has a high severity rating due to the potential for denial of service and arbitrary code execution.
To fix CVE-2015-8982, you should upgrade the GNU C Library (glibc) to version 2.21 or later.
CVE-2015-8982 affects versions of the GNU C Library (glibc) prior to 2.21.
Attackers can exploit CVE-2015-8982 by sending a specially crafted long string to trigger an integer overflow leading to a buffer overflow.
CVE-2015-8982 is considered a context-dependent vulnerability, meaning it can be exploited remotely under certain circumstances.