Vulnerability Description
Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | < 2.26 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2010/Apr/399Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2010/08/25/8Mailing List
- http://www.openwall.com/lists/oss-security/2010/08/31/6Mailing List
- http://www.openwall.com/lists/oss-security/2010/08/31/7Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/2Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/3Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/4Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/5Mailing List
- http://seclists.org/fulldisclosure/2010/Apr/399Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2010/08/25/8Mailing List
- http://www.openwall.com/lists/oss-security/2010/08/31/6Mailing List
- http://www.openwall.com/lists/oss-security/2010/08/31/7Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/2Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/3Mailing List
- http://www.openwall.com/lists/oss-security/2010/09/02/4Mailing List
FAQ
What is CVE-2010-3192?
CVE-2010-3192 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive infor...
How severe is CVE-2010-3192?
CVE-2010-3192 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3192?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.