Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) before 2.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted format string, as demonstrated by the %99999999999999999999n string, a related issue to CVE-2008-1391.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glibc | Gnu | 2.2.2 | 2.2.2 |
Glibc | Gnu | 2.7 | 2.7 |
Glibc | Gnu | 2.1.2 | 2.1.2 |
Glibc | Gnu | 2.0.5 | 2.0.5 |
Glibc | Gnu | 2.2.5 | 2.2.5 |
Glibc | Gnu | 2.0.6 | 2.0.6 |
Glibc | Gnu | 1.00 | 1.00 |
Glibc | Gnu | 1.06 | 1.06 |
Glibc | Gnu | 2.1.1 | 2.1.1 |
Glibc | Gnu | 1.02 | 1.02 |
Glibc | Gnu | 2.0.3 | 2.0.3 |
Glibc | Gnu | 1.07 | 1.07 |
Glibc | Gnu | 2.3.1 | 2.3.1 |
Glibc | Gnu | 2.3 | 2.3 |
Glibc | Gnu | 2.0 | 2.0 |
Glibc | Gnu | 2.1.1.6 | 2.1.1.6 |
Glibc | Gnu | 1.04 | 1.04 |
Glibc | Gnu | 1.01 | 1.01 |
Glibc | Gnu | 2.3.10 | 2.3.10 |
Glibc | Gnu | 2.4 | 2.4 |
Glibc | Gnu | 2.1 | 2.1 |
Glibc | Gnu | 2.3.4 | 2.3.4 |
Glibc | Gnu | 2.1.9 | 2.1.9 |
Glibc | Gnu | 2.3.3 | 2.3.3 |
Glibc | Gnu | 2.6.1 | 2.6.1 |
Glibc | Gnu | 2.0.1 | 2.0.1 |
Glibc | Gnu | 1.09 | 1.09 |
Glibc | Gnu | 2.5.1 | 2.5.1 |
Glibc | Gnu | 2.6 | 2.6 |
Glibc | Gnu | 2.0.4 | 2.0.4 |
Glibc | Gnu | 2.0.2 | 2.0.2 |
Glibc | Gnu | 2.2.1 | 2.2.1 |
Glibc | Gnu | 2.3.2 | 2.3.2 |
Glibc | Gnu | 1.03 | 1.03 |
Glibc | Gnu | 2.1.3.10 | 2.1.3.10 |
Glibc | Gnu | 2.3.6 | 2.3.6 |
Glibc | Gnu | 2.2.3 | 2.2.3 |
Glibc | Gnu | 2.5 | 2.5 |
Glibc | Gnu | 1.08 | 1.08 |
Glibc | Gnu | 2.3.5 | 2.3.5 |
Glibc | Gnu | 2.8 | 2.8 |
Glibc | Gnu | * | 2.9 |
Glibc | Gnu | 2.2.4 | 2.2.4 |
Glibc | Gnu | 2.1.3 | 2.1.3 |
Glibc | Gnu | 1.05 | 1.05 |
Glibc | Gnu | 2.2 | 2.2 |