CVE-2015-8982Integer Overflow or Wraparound in Glibc

Severity
8.1HIGHNVD
OSV7.5
EPSS
1.3%
top 20.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 15
Latest updateMay 13

Description

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

Debiangnu/glibc< 2.21-1+3
Ubuntugnu/glibc< 2.23-0ubuntu6
Ubuntueglibc/eglibc< 2.19-0ubuntu6.10
NVDgnu/glibc2.20

Patches

🔴Vulnerability Details

5
GHSA
GHSA-qw97-54gm-4j6w: Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 22022-05-13
OSV
eglibc, glibc vulnerabilities2017-03-21
OSV
eglibc, glibc regression2017-03-21
OSV
CVE-2015-8982: Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 22017-03-15
CVEList
CVE-2015-8982: Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 22017-03-15

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2017-03-21
Red Hat
glibc: multiple overflows in strxfrm()2015-02-13
Debian
CVE-2015-8982: glibc - Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc...2015

💬Community

2
Bugzilla
CVE-2015-8982 glibc: multiple overflows in strxfrm()2015-02-13
Bugzilla
CVE-2015-8982 glibc: multiple overflows in strxfrm() [fedora-all]2015-02-13
CVE-2015-8982 — Integer Overflow or Wraparound in Glibc | cvebase