MEDIUM · 6.4

CVE-2015-1473

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca functio...

Vulnerability Description

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS Score

6.4

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:P
Confidentiality
NONE
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
CanonicalUbuntu Linux10.04
GnuGlibc<= 2.20

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-1473?

CVE-2015-1473 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca functio...

How severe is CVE-2015-1473?

CVE-2015-1473 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-1473?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Gnu Glibc.