CVE-2015-8779

CWE-119Buffer Overflow9 documents8 sources
Severity
9.8CRITICAL
EPSS
9.7%
top 7.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 19
Latest updateMay 14

Description

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

Debianglibc< 2.21-7+3
NVDgnu/glibc2.22

Also affects: Debian Linux 8.0, Fedora 23, Ubuntu Linux 12.04, 14.04, 15.10

🔴Vulnerability Details

3
GHSA
GHSA-p8hg-r2c3-83hv: Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 22022-05-14
OSV
CVE-2015-8779: Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 22016-04-19
CVEList
CVE-2015-8779: Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 22016-04-19

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2016-05-25
Red Hat
glibc: Unbounded stack allocation in catopen function2015-01-29
Debian
CVE-2015-8779: glibc - Stack-based buffer overflow in the catopen function in the GNU C Library (aka gl...2015

💬Community

2
Bugzilla
CVE-2015-8779 glibc: Unbounded stack allocation in catopen function2016-01-20
Bugzilla
CVE-2015-8779 glibc: Unbounded stack allocation in catopen function [fedora-all]2016-01-20
CVE-2015-8779 (CRITICAL CVSS 9.8) | Stack-based buffer overflow in the | cvebase.io