CVE-2013-0223

low

Description

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

References

https://bugzilla.novell.com/show_bug.cgi?id=798541

http://rhn.redhat.com/errata/RHSA-2013-1652.html

https://bugzilla.redhat.com/show_bug.cgi?id=903466

https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19

Details

Source: MITRE

Published: 2013-11-23

Updated: 2021-05-13

Type: CWE-119

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW