CRITICAL · 9.1

CVE-2015-8776

The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information...

Vulnerability Description

The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.

CVSS Score

9.1

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
SuseLinux Enterprise Debuginfo11
OpensuseOpensuse13.2
SuseLinux Enterprise Desktop11
SuseLinux Enterprise Server11
SuseLinux Enterprise Software Development Kit11
SuseSuse Linux Enterprise Server12
CanonicalUbuntu Linux12.04
DebianDebian Linux8.0
FedoraprojectFedora23
GnuGlibc<= 2.22

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-8776?

CVE-2015-8776 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information...

How severe is CVE-2015-8776?

CVE-2015-8776 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2015-8776?

Check the references section above for vendor advisories and patch information. Affected products include: Suse Linux Enterprise Debuginfo, Opensuse Opensuse, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server, Suse Linux Enterprise Software Development Kit.