First published: Fri Feb 03 2023(Updated: )
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-25139 is critical.
The affected software for CVE-2023-25139 is GNU glibc version 2.37.
The Common Weakness Enumeration (CWE) ID for CVE-2023-25139 is CWE-119 and CWE-787.
CVE-2023-25139 is a buffer overflow vulnerability in sprintf function in GNU C Library (glibc) 2.37, which can result in out-of-bounds write in some situations.
To fix CVE-2023-25139, it is recommended to update to a version of GNU C Library (glibc) that is not affected by this vulnerability.