exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-162

Mandriva Linux Security Advisory 2013-162
Posted May 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-162 - Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. Multiple errors in glibc's formatted printing functionality could allow an attacker to bypass FORTIFY_SOURCE protections and execute arbitrary code using a format string flaw in an application, even though these protections are expected to limit the impact of such flaws to an application abort. Various other issues were also addressed. The updated packages have been patched to correct these issues.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-0864, CVE-2012-3404, CVE-2012-3405, CVE-2012-3406, CVE-2012-3480, CVE-2013-0242, CVE-2013-1914
SHA-256 | 813cdf2b71f75914d833c5f26c1da07143f7dab6acfaf1fa4b28d8655d95c6f1

Mandriva Linux Security Advisory 2013-162

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:162
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : glibc
Date : May 7, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in glibc:

Integer overflow in the vfprintf function in stdio-common/vfprintf.c
in glibc 2.14 and other versions allows context-dependent attackers to
bypass the FORTIFY_SOURCE protection mechanism, conduct format string
attacks, and write to arbitrary memory via a large number of arguments
(CVE-2012-0864).

Multiple errors in glibc's formatted printing functionality could
allow an attacker to bypass FORTIFY_SOURCE protections and execute
arbitrary code using a format string flaw in an application, even
though these protections are expected to limit the impact of such flaws
to an application abort (CVE-2012-3404, CVE-2012-3405, CVE-2012-3406).

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold,
(4) strtod_l, and other unspecified related functions in stdlib in
GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a
denial of service (application crash) and possibly execute arbitrary
code via a long string, which triggers a stack-based buffer overflow
(CVE-2012-3480).

Buffer overflow in the extend_buffers function in the regular
expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
earlier, allows context-dependent attackers to cause a denial of
service (memory corruption and crash) via crafted multibyte characters
(CVE-2013-0242).

Stack-based buffer overflow in the getaddrinfo function in
sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
2.17 and earlier allows remote attackers to cause a denial of service
(crash) via a (1) hostname or (2) IP address that triggers a large
number of domain conversion results (CVE-2013-1914).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
87712654b036070964fb35385f398279 mes5/i586/glibc-2.8-1.20080520.5.9mnb2.i586.rpm
eae25c5265ca4d2dab2dbf8b0450b6a5 mes5/i586/glibc-devel-2.8-1.20080520.5.9mnb2.i586.rpm
161b6288a6c2b13b299e6e7bdd699eae mes5/i586/glibc-doc-2.8-1.20080520.5.9mnb2.i586.rpm
08948383eccf30d736dfeaef53430eab mes5/i586/glibc-doc-pdf-2.8-1.20080520.5.9mnb2.i586.rpm
6f1ae9e591ed477bf56c7a3a1f7770be mes5/i586/glibc-i18ndata-2.8-1.20080520.5.9mnb2.i586.rpm
7beb9227ce1bbff7fe2848b5fad3b4ca mes5/i586/glibc-profile-2.8-1.20080520.5.9mnb2.i586.rpm
2451007d981f0314f675e7edd387003b mes5/i586/glibc-static-devel-2.8-1.20080520.5.9mnb2.i586.rpm
e502bca8475975d9e2ce11eec93a10d2 mes5/i586/glibc-utils-2.8-1.20080520.5.9mnb2.i586.rpm
63241c1d294d1972b3d12206e4d38eb3 mes5/i586/nscd-2.8-1.20080520.5.9mnb2.i586.rpm
641edd61d4e607e9ccd4c5b3c8c790ac mes5/SRPMS/glibc-2.8-1.20080520.5.9mnb2.src.rpm

Mandriva Enterprise Server 5/X86_64:
4c8e423f7ddc996f087e2fc304329b31 mes5/x86_64/glibc-2.8-1.20080520.5.9mnb2.x86_64.rpm
e7d749c4c4ffdd3b8320ca4af0f1ed72 mes5/x86_64/glibc-devel-2.8-1.20080520.5.9mnb2.x86_64.rpm
b5fb6b11ed3bb0ab2ad5168be6371457 mes5/x86_64/glibc-doc-2.8-1.20080520.5.9mnb2.x86_64.rpm
f4392e4257f604bfb9baf17740e1cc7d mes5/x86_64/glibc-doc-pdf-2.8-1.20080520.5.9mnb2.x86_64.rpm
0cddcf4e1d98b60c892ca22741b08d11 mes5/x86_64/glibc-i18ndata-2.8-1.20080520.5.9mnb2.x86_64.rpm
301995478a3f943d5d0448cbc561e436 mes5/x86_64/glibc-profile-2.8-1.20080520.5.9mnb2.x86_64.rpm
395f0f667999586e57e296c6b867e616 mes5/x86_64/glibc-static-devel-2.8-1.20080520.5.9mnb2.x86_64.rpm
0595e256f6c1e2f2c7f94cca21fd4f35 mes5/x86_64/glibc-utils-2.8-1.20080520.5.9mnb2.x86_64.rpm
ea48c2685180f722187736bc8a624e58 mes5/x86_64/nscd-2.8-1.20080520.5.9mnb2.x86_64.rpm
641edd61d4e607e9ccd4c5b3c8c790ac mes5/SRPMS/glibc-2.8-1.20080520.5.9mnb2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRiQOqmqjQ0CJFipgRApJ3AJ9tXPrzanxd9DLXL9NA/nRs1On+FgCg4nu6
8wdGlp+wXjbduJP3ppWS+PM=
=xSqC
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close