Vulnerability Description
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | < 2.3.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/107871
- https://sourceware.org/bugzilla/show_bug.cgi?id=661Issue TrackingPatchThird Party Advisory
- https://support.f5.com/csp/article/K12740406
- http://www.securityfocus.com/bid/107871
- https://sourceware.org/bugzilla/show_bug.cgi?id=661Issue TrackingPatchThird Party Advisory
- https://support.f5.com/csp/article/K12740406
FAQ
What is CVE-2005-3590?
CVE-2005-3590 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buff...
How severe is CVE-2005-3590?
CVE-2005-3590 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2005-3590?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.