Vulnerability Description
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 6.0 |
| Opensuse | Opensuse | 12.1 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-1652.htmlVendor Advisory
- https://bugzilla.novell.com/show_bug.cgi?id=798538ExploitIssue Tracking
- https://bugzilla.redhat.com/show_bug.cgi?id=903464Issue Tracking
- https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patcExploitPatch
- http://rhn.redhat.com/errata/RHSA-2013-1652.htmlVendor Advisory
- https://bugzilla.novell.com/show_bug.cgi?id=798538ExploitIssue Tracking
- https://bugzilla.redhat.com/show_bug.cgi?id=903464Issue Tracking
- https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patcExploitPatch
FAQ
What is CVE-2013-0221?
CVE-2013-0221 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1)...
How severe is CVE-2013-0221?
CVE-2013-0221 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0221?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Opensuse Opensuse.