CVE-2011-1659

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

References

http://code.google.com/p/chromium/issues/detail?id=48733

http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html

http://secunia.com/advisories/44353

http://secunia.com/advisories/46397

http://sourceware.org/bugzilla/show_bug.cgi?id=12583

http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485

http://www.mandriva.com/security/advisories?name=MDVSA-2011:178

http://www.mandriva.com/security/advisories?name=MDVSA-2011:179

http://www.securityfocus.com/archive/1/520102/100/0/threaded

http://www.securitytracker.com/id?1025450

http://www.vmware.com/security/advisories/VMSA-2011-0012.html

https://bugzilla.redhat.com/show_bug.cgi?id=681054

https://exchange.xforce.ibmcloud.com/vulnerabilities/66819

Details

Source: MITRE

Published: 2011-04-08

Updated: 2018-10-09

Type: CWE-189

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to 2.13 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
93030F5 Networks BIG-IP : glibc vulnerability (SOL09408132)NessusF5 Networks Local Security Checks
medium
89680VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0012) (remote check)NessusMisc.
high
89679VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0010) (remote check)NessusMisc.
high
71167GLSA-201312-01 : GNU C Library: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
70880ESXi 5.0 < Build 515841 Multiple Vulnerabilities (remote check)NessusMisc.
high
68455Oracle Linux 4 : glibc (ELSA-2012-0125)NessusOracle Linux Local Security Checks
high
68245Oracle Linux 6 : glibc (ELSA-2011-0413)NessusOracle Linux Local Security Checks
medium
68244Oracle Linux 5 : glibc (ELSA-2011-0412)NessusOracle Linux Local Security Checks
high
61938Mandriva Linux Security Advisory : glibc (MDVSA-2011:179)NessusMandriva Local Security Checks
medium
58318Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : eglibc, glibc vulnerabilities (USN-1396-1)NessusUbuntu Local Security Checks
high
57928RHEL 4 : glibc (RHSA-2012:0125)NessusRed Hat Local Security Checks
high
57923CentOS 4 : glibc (CESA-2012:0125)NessusCentOS Local Security Checks
high
56953Mandriva Linux Security Advisory : glibc (MDVSA-2011:178)NessusMandriva Local Security Checks
medium
56508VMSA-2011-0012 : VMware ESXi and ESX updates to third-party libraries and ESX Service ConsoleNessusVMware ESX Local Security Checks
high
55747VMSA-2011-0010 : VMware ESX third-party updates for Service Console packages glibc and dhcpNessusVMware ESX Local Security Checks
high
53430CentOS 5 : glibc (CESA-2011:0412)NessusCentOS Local Security Checks
high
53292RHEL 6 : glibc (RHSA-2011:0413)NessusRed Hat Local Security Checks
medium
53291RHEL 5 : glibc (RHSA-2011:0412)NessusRed Hat Local Security Checks
high