Vulnerability Description
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | < 2.24 |
| Opensuse | Leap | 42.1 |
| Opensuse | Opensuse | 13.2 |
| Fedoraproject | Fedora | 23 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.htmlIssue TrackingPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.htmlIssue TrackingPatchThird Party Advisory
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Sc
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://www.openwall.com/lists/oss-security/2016/03/07/16Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/84204Third Party AdvisoryVDB Entry
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e3
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8
- https://security.gentoo.org/glsa/201702-11Third Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=19779ExploitIssue TrackingThird Party Advisory
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.htmlIssue TrackingPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.htmlIssue TrackingPatchThird Party Advisory
FAQ
What is CVE-2016-1234?
CVE-2016-1234 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) v...
How severe is CVE-2016-1234?
CVE-2016-1234 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1234?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Opensuse Leap, Opensuse Opensuse, Fedoraproject Fedora.