MEDIUM · 6.8

CVE-2012-3406

The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPE...

Vulnerability Description

The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
GnuGlibc2.5
RedhatEnterprise Virtualization3.0
CanonicalUbuntu Linux8.04
RedhatEnterprise Linux5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3406?

CVE-2012-3406 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPE...

How severe is CVE-2012-3406?

CVE-2012-3406 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3406?

Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Redhat Enterprise Virtualization, Canonical Ubuntu Linux, Redhat Enterprise Linux.