CVE-2012-3405

CWE-18910 documents8 sources
Severity
5.0MEDIUM
EPSS
0.7%
top 28.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 10
Latest updateMay 14

Description

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

Debianglibc< 2.13-35+3
NVDgnu/glibc2.14

Also affects: Ubuntu Linux 10.04, 11.04, 11.10, 12.04, 8.04, Enterprise Linux 6.0

🔴Vulnerability Details

3
GHSA
GHSA-fwxh-prpx-6qg8: The vfprintf function in stdio-common/vfprintf2022-05-14
OSV
CVE-2012-3405: The vfprintf function in stdio-common/vfprintf2014-02-10
CVEList
CVE-2012-3405: The vfprintf function in stdio-common/vfprintf2014-02-10

📋Vendor Advisories

4
Ubuntu
GNU C Library vulnerabilities2012-10-02
Red Hat
glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass2012-07-11
Red Hat
glibc: printf() unbound alloca() usage in case of positional parameters + many format specs2012-07-11
Debian
CVE-2012-3405: glibc - The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka g...2012

💬Community

2
Bugzilla
CVE-2012-3405 CVE-2012-3406 glibc various flaws [fedora-all]2012-07-18
Bugzilla
CVE-2012-3405 glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass2012-06-20