CVE-2011-1071 (GCVE-0-2011-1071)
Vulnerability from cvelistv5
Published
2011-04-08 15:00
Modified
2024-08-06 22:14
Severity ?
CWE
  • n/a
Summary
The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.
References
secalert@redhat.com http://bugs.debian.org/615120 Exploit
secalert@redhat.com http://code.google.com/p/chromium/issues/detail?id=48733 Exploit
secalert@redhat.com http://openwall.com/lists/oss-security/2011/02/26/3
secalert@redhat.com http://openwall.com/lists/oss-security/2011/02/28/11 Exploit
secalert@redhat.com http://openwall.com/lists/oss-security/2011/02/28/15
secalert@redhat.com http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html Exploit
secalert@redhat.com http://seclists.org/fulldisclosure/2011/Feb/635 Exploit
secalert@redhat.com http://seclists.org/fulldisclosure/2011/Feb/644 Patch
secalert@redhat.com http://secunia.com/advisories/43492 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/43830 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/43989 Vendor Advisory
secalert@redhat.com http://secunia.com/advisories/46397 Vendor Advisory
secalert@redhat.com http://securityreason.com/securityalert/8175
secalert@redhat.com http://securitytracker.com/id?1025290
secalert@redhat.com http://sourceware.org/bugzilla/show_bug.cgi?id=11883 Exploit
secalert@redhat.com http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6
secalert@redhat.com http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
secalert@redhat.com http://www.redhat.com/support/errata/RHSA-2011-0412.html Vendor Advisory
secalert@redhat.com http://www.redhat.com/support/errata/RHSA-2011-0413.html Vendor Advisory
secalert@redhat.com http://www.securityfocus.com/archive/1/520102/100/0/threaded
secalert@redhat.com http://www.securityfocus.com/bid/46563 Exploit
secalert@redhat.com http://www.vmware.com/security/advisories/VMSA-2011-0012.html
secalert@redhat.com http://www.vupen.com/english/advisories/2011/0863 Vendor Advisory
secalert@redhat.com https://bugzilla.redhat.com/show_bug.cgi?id=681054 Exploit, Patch
secalert@redhat.com https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853
af854a3a-2127-422b-91ae-364da2661108 http://bugs.debian.org/615120 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://code.google.com/p/chromium/issues/detail?id=48733 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://openwall.com/lists/oss-security/2011/02/26/3
af854a3a-2127-422b-91ae-364da2661108 http://openwall.com/lists/oss-security/2011/02/28/11 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://openwall.com/lists/oss-security/2011/02/28/15
af854a3a-2127-422b-91ae-364da2661108 http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html Exploit
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2011/Feb/635 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2011/Feb/644 Patch
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43492 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43830 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/43989 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/46397 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securityreason.com/securityalert/8175
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1025290
af854a3a-2127-422b-91ae-364da2661108 http://sourceware.org/bugzilla/show_bug.cgi?id=11883 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2011-0412.html Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2011-0413.html Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/520102/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/46563 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.vmware.com/security/advisories/VMSA-2011-0012.html
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2011/0863 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 https://bugzilla.redhat.com/show_bug.cgi?id=681054 Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.827Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46563",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46563"
          },
          {
            "name": "8175",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8175"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
          },
          {
            "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
          },
          {
            "name": "46397",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46397"
          },
          {
            "name": "RHSA-2011:0412",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html"
          },
          {
            "name": "ADV-2011-0863",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0863"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/615120"
          },
          {
            "name": "43989",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43989"
          },
          {
            "name": "1025290",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025290"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883"
          },
          {
            "name": "43492",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43492"
          },
          {
            "name": "[oss-security] 20110228 cve request: eglibc memory corruption",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/26/3"
          },
          {
            "name": "oval:org.mitre.oval:def:12853",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853"
          },
          {
            "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/11"
          },
          {
            "name": "20110224 glibc and alloca()",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Feb/635"
          },
          {
            "name": "20110226 Re: glibc and alloca()",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2011/Feb/644"
          },
          {
            "name": "MDVSA-2011:178",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
          },
          {
            "name": "43830",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43830"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6"
          },
          {
            "name": "RHSA-2011:0413",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
          },
          {
            "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/chromium/issues/detail?id=48733"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a \"stack extension attack,\" a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "46563",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46563"
        },
        {
          "name": "8175",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8175"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054"
        },
        {
          "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
        },
        {
          "name": "46397",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46397"
        },
        {
          "name": "RHSA-2011:0412",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html"
        },
        {
          "name": "ADV-2011-0863",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0863"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/615120"
        },
        {
          "name": "43989",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43989"
        },
        {
          "name": "1025290",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025290"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883"
        },
        {
          "name": "43492",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43492"
        },
        {
          "name": "[oss-security] 20110228 cve request: eglibc memory corruption",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/26/3"
        },
        {
          "name": "oval:org.mitre.oval:def:12853",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853"
        },
        {
          "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/11"
        },
        {
          "name": "20110224 glibc and alloca()",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Feb/635"
        },
        {
          "name": "20110226 Re: glibc and alloca()",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2011/Feb/644"
        },
        {
          "name": "MDVSA-2011:178",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"
        },
        {
          "name": "43830",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43830"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6"
        },
        {
          "name": "RHSA-2011:0413",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
        },
        {
          "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/chromium/issues/detail?id=48733"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1071",
    "datePublished": "2011-04-08T15:00:00",
    "dateReserved": "2011-02-24T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-1071\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-04-08T15:17:27.650\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a \\\"stack extension attack,\\\" a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.\"},{\"lang\":\"es\",\"value\":\"La Biblioteca C (tambi\u00e9n se conoce como glibc o libc6) anterior a versi\u00f3n 2.12.2 y Embedded GLIBC (EGLIBC), de GNU, permiten a los atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (consumo de memoria) por medio de una cadena UTF8 larga que es usada en una funci\u00f3n llamada fnmatch, tambi\u00e9n se conoce como  \\\"stack extension attack,\\\"  un problema relacionado con CVE-2010-2898, CVE-2010-1917 y CVE-2007-4782, como se inform\u00f3 originalmente para el uso de esta biblioteca por Google Chrome.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB89B5AD-38B6-4BB2-A150-90A7807BE024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.1\",\"matchCriteriaId\":\"EA47E340-2191-4471-9415-F325A72C9B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA23C241-132B-423E-A22A-7206A8074D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79978B1-8831-4169-B815-80138C85832C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"991EB676-F043-418D-BD81-0BB937236D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA0C5DB0-602E-4296-884C-60E24FC80458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3211F47C-DF6D-4355-95F8-DED317700621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"229BFD88-A90F-4D2B-97B9-822A7D87EAEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE253B0-D8E0-4099-8CA7-8925B4809F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D640F556-8181-4F15-B2F7-7EC7E8869FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"061383CD-B9AD-41C6-8C46-F79870B9CD22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9897B03F-A457-4B29-9C5E-FEA084D3BF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C3684B-CE01-46B5-9E41-BF58E6A5AA64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C0577C-6BC7-418F-B2C5-B74800D43418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA795F7-8AAC-42BA-971B-601346704BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CADA314-C0D0-40F8-9019-884F17D0B54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"255E0C0D-0B70-4C10-BF7C-34193AA24C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F424F2F5-D7E4-4A13-A8CF-32D466610BDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC4E7AE-BDC4-48F1-9FDE-3F3FAA3F40F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1329215-C53A-40D5-8E9C-F457D092E483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2A0F12-FD00-40B9-86AD-7D082385E5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED8F0E8-A969-4F7F-A100-662F4A5426FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416576F-A605-45BE-AA01-FEF357A66979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE582B8F-4E31-4D0F-B2F9-AC83C855F751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB56D9C9-13B3-418C-B06C-0997E165F1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFD93D5-70BB-475C-BDD3-DEDE9965C5BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D5667D-5EA4-4B44-BF8A-9C10506BD4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F23D2F-A01F-4949-A917-D1164E14EAA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64576C9A-FCD9-4410-B590-AB43F9F85D2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"229AC4E3-AFBA-4EF4-8534-8FBE1E630253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B91503A-E8DC-4DFF-98D4-687B5AE41438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241A4B59-7BBC-4656-93AC-7DD8BE29EB58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00D0DBDC-1559-406D-AADC-12B5ABDD2BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5294FCC-3933-4CD5-8DFE-BCDC00F4BD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CA3E33-7CC6-4AC5-999A-3C46D7FD14A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAADC158-B7EF-4135-B383-0DA43065B43E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261A4A17-3B9E-46E6-897B-DB0C8358A1D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAC8483-5060-428B-8D8E-C30E5823BB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A511B6-72EC-4200-8C1C-BDE30BC2431A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03C644D-0EF9-4586-96D5-5DEE78D9D5C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AD8A88-DAF0-4206-8661-70075BA2AE55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42AD17CD-545F-425A-92CF-0EE5F5B5F74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0B9503-9AD0-4A1A-BD4F-4B902BFC8E5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0660536D-7F82-4B91-8B84-704D26FE989F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2037E8C-43E8-4121-B877-1834282ACD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCA5E85-9AFA-429A-AC51-8D8EC2841330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41ABE25-DECD-4068-93DA-0B85281FD93A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84600406-0CE2-46EA-A5AD-4CC0D3494AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96FA9ED-7529-440D-984D-6340B94D8243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3D70AB0-2910-4191-9980-5BA78E8F2E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A30D0EE-1AED-4C99-8A22-24E47212F3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A93600D-7271-4AF5-8133-C6AA5BC8543F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4169CA4B-C4F5-499A-A35A-49DD43AC0A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AC9749-52C5-4E17-8A77-5F4ED91FA8E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55E32EC-33A6-4145-9B76-C7E3DBACD1E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6423F0B5-E483-4DE9-B13F-3A7322F055DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B4AFFF-A537-44BD-B97A-EFA9409DB8BB\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/615120\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=48733\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/26/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/28/11\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/28/15\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Feb/635\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Feb/644\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/43492\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43830\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43989\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8175\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1025290\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceware.org/bugzilla/show_bug.cgi?id=11883\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0412.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0413.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/46563\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0863\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=681054\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.debian.org/615120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=48733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/26/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/28/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/02/28/15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Feb/635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2011/Feb/644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/43492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/46397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/8175\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1025290\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceware.org/bugzilla/show_bug.cgi?id=11883\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0412.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0413.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/520102/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0863\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=681054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…