CVE-2012-3404
Severity
5.0MEDIUM
EPSS
0.6%
top 30.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
Latest updateMay 14
Description
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
CVSS vector
AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9
Affected Packages3 packages
Also affects: Ubuntu Linux 10.04, 11.04, 11.10, 12.04, 8.04, Enterprise Linux 6.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
5Red Hat▶
glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass↗2012-07-11
Red Hat▶
glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass↗2012-07-11
Red Hat▶
glibc: printf() unbound alloca() usage in case of positional parameters + many format specs↗2012-07-11
Debian▶
CVE-2012-3404: glibc - The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka g...↗2012
💬Community
1Bugzilla▶
CVE-2012-3404 glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass↗2012-06-20