← Voltar para CVEs
CVE-2012-3480
N/ADescricao
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/25/2012
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
gnu:glibc
Fraquezas (CWE)
CWE-189
Referencias
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html(secalert@redhat.com)
http://osvdb.org/84710(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1207.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1208.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1262.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1325.html(secalert@redhat.com)
http://secunia.com/advisories/50201(secalert@redhat.com)
http://secunia.com/advisories/50422(secalert@redhat.com)
http://sourceware.org/bugzilla/show_bug.cgi?id=14459(secalert@redhat.com)
http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/08/13/4(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/08/13/6(secalert@redhat.com)
http://www.securityfocus.com/bid/54982(secalert@redhat.com)
http://www.securitytracker.com/id?1027374(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-1589-1(secalert@redhat.com)
https://security.gentoo.org/glsa/201503-04(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/84710(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1207.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1208.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1262.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1325.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50201(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50422(af854a3a-2127-422b-91ae-364da2661108)
http://sourceware.org/bugzilla/show_bug.cgi?id=14459(af854a3a-2127-422b-91ae-364da2661108)
http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/08/13/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/08/13/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/54982(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1027374(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1589-1(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201503-04(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.