Gnu Glibc vulnerabilities

165 known vulnerabilities affecting gnu/glibc.

Total CVEs
165
CISA KEV
1
actively exploited
Public exploits
25
Exploited in wild
1
Severity breakdown
CRITICAL23HIGH64MEDIUM69LOW9

Vulnerabilities

Page 7 of 9
CVE-2013-4332MEDIUMCVSS 4.3≤ 2.18v2.0+25 more2013-10-09
CVE-2013-4332 [MEDIUM] CWE-189 CVE-2013-4332: Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and ear Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
nvdosv
CVE-2013-2207LOWCVSS 2.6≤ 2.17v2.0+24 more2013-10-09
CVE-2013-2207 [LOW] CWE-264 CVE-2013-2207: pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for t pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
nvdosv
CVE-2013-4788MEDIUMCVSS 5.1PoC≤ 2.17v2.0+25 more2013-10-04
CVE-2013-4788 [MEDIUM] CWE-20 CVE-2013-4788: The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero va
nvdosv
CVE-2009-5029MEDIUMCVSS 6.8PoC≤ 2.14v2.0+13 more2013-05-02
CVE-2009-5029 [MEDIUM] CWE-189 CVE-2009-5029: Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attacke Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
nvdosv
CVE-2012-0864MEDIUMCVSS 6.8v2.142013-05-02
CVE-2012-0864 [MEDIUM] CWE-189 CVE-2012-0864: Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other version Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
nvd
CVE-2011-4609MEDIUMCVSS 5.0≤ 2.14v2.0+13 more2013-05-02
CVE-2011-4609 [MEDIUM] CWE-399 CVE-2011-4609: The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.
nvd
CVE-2013-1914MEDIUMCVSS 5.0≤ 2.17v2.0.1+34 more2013-04-29
CVE-2013-1914 [MEDIUM] CWE-119 CVE-2013-1914: Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Libr Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
nvdosv
CVE-2013-0242MEDIUMCVSS 5.0v2.172013-02-08
CVE-2013-0242 [MEDIUM] CWE-119 CVE-2013-0242: Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) i Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
nvdosv
CVE-2012-3480MEDIUMCVSS 4.6PoCv2.162012-08-25
CVE-2012-3480 [MEDIUM] CWE-189 CVE-2012-3480: Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspe Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
nvdosv
CVE-2011-1095MEDIUMCVSS 6.2≤ 2.12.2v1.00+55 more2011-04-10
CVE-2011-1095 [MEDIUM] CWE-264 CVE-2011-1095: locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not qu locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.
nvdosv
CVE-2011-1089LOWCVSS 3.3≤ 2.13v1.00+56 more2011-04-10
CVE-2011-1089 [LOW] CWE-16 CVE-2011-1089: The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-029
nvdosv
CVE-2011-1659MEDIUMCVSS 5.0≤ 2.13v1.00+56 more2011-04-08
CVE-2011-1659 [MEDIUM] CVE-2011-1659: Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allow Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
nvdosv
CVE-2011-0536MEDIUMCVSS 6.9PoCv2.5-49.el5_5.6v2.12-1.7.el6_0.32011-04-08
CVE-2011-0536 [MEDIUM] CVE-2011-0536: Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of th Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during
nvd
CVE-2011-1071MEDIUMCVSS 5.1PoC≤ 2.12.1v1.00+54 more2011-04-08
CVE-2011-1071 [MEDIUM] CWE-399 CVE-2011-1071: The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-depen The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as ori
nvdosv
CVE-2011-1658LOWCVSS 3.7≤ 2.13v1.00+56 more2011-04-08
CVE-2011-1658 [LOW] CVE-2011-1658: ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value
nvd
CVE-2009-5064MEDIUMCVSS 6.9≤ 2.1.3v1.00+21 more2011-03-30
CVE-2009-5064 [MEDIUM] CWE-264 CVE-2009-5064: ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloadi
nvdosv
CVE-2010-4052MEDIUMCVSS 5.0PoCv1.00v1.01+26 more2011-01-13
CVE-2010-4052 [MEDIUM] CWE-399 CVE-2010-4052: Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or lib Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in
nvdosv
CVE-2010-4051MEDIUMCVSS 5.0PoCv1.00v1.01+26 more2011-01-13
CVE-2010-4051 [MEDIUM] CVE-2010-4051: The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x thro The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} seque
nvdosv
CVE-2010-3856HIGHCVSS 7.2PoC≤ 2.11.2v1.00+53 more2011-01-07
CVE-2010-3856 [HIGH] CWE-264 CVE-2010-3856: ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not pr ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcp
nvdosv
CVE-2010-3847MEDIUMCVSS 6.9PoC≤ 2.11.2v1.00+53 more2011-01-07
CVE-2010-3847 [MEDIUM] CWE-59 CVE-2010-3847: elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
nvdosv