CVE-2015-20109

Severity
5.5MEDIUM
EPSS
0.0%
top 91.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 25
Latest updateMay 2

Description

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDgnu/glibc< 2.22
Debianglibc< 2.22-1+3
Ubuntuglibc< 2.23-0ubuntu11.3+esm6+1
Ubuntueglibc< 2.19-0ubuntu6.15+esm3

🔴Vulnerability Details

4
OSV
eglibc, glibc vulnerabilities2024-05-02
GHSA
GHSA-rf48-x9gm-3vx2: end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 22023-06-25
CVEList
CVE-2015-20109: end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 22023-06-25
OSV
CVE-2015-20109: end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 22023-06-25

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2024-05-02
Red Hat
glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with "**(!()" pattern2023-06-25
Debian
CVE-2015-20109: glibc - end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or li...2015
CVE-2015-20109 (MEDIUM CVSS 5.5) | end_pattern (called from internal_f | cvebase.io