CVE-2016-1234 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Glibc
Severity
7.5HIGHNVD
EPSS
1.3%
top 20.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 1
Latest updateMay 13
Description
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
Also affects: Fedora 23
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-mphv-4vqv-3v34: Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2↗2022-05-13
OSV▶
CVE-2016-1234: Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2↗2016-06-01
CVEList▶
CVE-2016-1234: Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2↗2016-06-01
💥Exploits & PoCs
1📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2016-6328 libexif: Integer overflow in parsing MNOTE entry data of the input file [fedora-all]↗2017-08-22
Bugzilla▶
CVE-2016-1234 glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory [fedora-all]↗2016-03-08
Bugzilla▶
CVE-2016-1234 glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory↗2016-03-08