Vulnerability Description
Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to an unbuffered stream such as stderr.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Etalabs | Musl | <= 0.8.8 |
Related Weaknesses (CWE)
References
- http://www.etalabs.net/musl/download.html
- http://www.openwall.com/lists/musl/2012/04/17/1
- http://www.openwall.com/lists/oss-security/2012/04/18/5
- http://www.openwall.com/lists/oss-security/2012/04/18/6
- http://www.securityfocus.com/bid/53144
- http://www.etalabs.net/musl/download.html
- http://www.openwall.com/lists/musl/2012/04/17/1
- http://www.openwall.com/lists/oss-security/2012/04/18/5
- http://www.openwall.com/lists/oss-security/2012/04/18/6
- http://www.securityfocus.com/bid/53144
FAQ
What is CVE-2012-2114?
CVE-2012-2114 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to ...
How severe is CVE-2012-2114?
CVE-2012-2114 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2114?
Check the references section above for vendor advisories and patch information. Affected products include: Etalabs Musl.