CVE-2012-3405
Severity
5.0MEDIUM
EPSS
0.7%
top 28.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
Latest updateMay 14
Description
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
CVSS vector
AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9
Affected Packages3 packages
Also affects: Ubuntu Linux 10.04, 11.04, 11.10, 12.04, 8.04, Enterprise Linux 6.0
🔴Vulnerability Details
3📋Vendor Advisories
4Red Hat▶
glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass↗2012-07-11
Red Hat▶
glibc: printf() unbound alloca() usage in case of positional parameters + many format specs↗2012-07-11
Debian▶
CVE-2012-3405: glibc - The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka g...↗2012