Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://rhn.redhat.com/errata/RHSA-2017-0680.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
http://www.securityfocus.com/bid/83306
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
https://access.redhat.com/errata/RHSA-2017:1916
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=16962
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
Source: MITRE
Published: 2016-04-19
Updated: 2019-06-13
Type: CWE-119
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
OR
OR
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to 2.22 (inclusive)
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
127324 | NewStart CGSL MAIN 4.05 : glibc Multiple Vulnerabilities (NS-SA-2019-0099) | Nessus | NewStart CGSL Local Security Checks | high |
125005 | EulerOS Virtualization 3.0.1.0 : glibc (EulerOS-SA-2019-1552) | Nessus | Huawei Local Security Checks | high |
105438 | F5 Networks BIG-IP : glibc vulnerability (K31211252) | Nessus | F5 Networks Local Security Checks | high |
103058 | EulerOS 2.0 SP2 : glibc (EulerOS-SA-2017-1200) | Nessus | Huawei Local Security Checks | high |
103057 | EulerOS 2.0 SP1 : glibc (EulerOS-SA-2017-1199) | Nessus | Huawei Local Security Checks | high |
102865 | Amazon Linux AMI : glibc (ALAS-2017-877) | Nessus | Amazon Linux Local Security Checks | high |
102743 | CentOS 7 : glibc (CESA-2017:1916) | Nessus | CentOS Local Security Checks | high |
102641 | Scientific Linux Security Update : glibc on SL7.x x86_64 (20170801) | Nessus | Scientific Linux Local Security Checks | high |
102288 | Oracle Linux 7 : glibc (ELSA-2017-1916) | Nessus | Oracle Linux Local Security Checks | high |
102149 | RHEL 7 : glibc (RHSA-2017:1916) | Nessus | Red Hat Local Security Checks | high |
99216 | Scientific Linux Security Update : glibc on SL6.x i386/x86_64 (20170321) | Nessus | Scientific Linux Local Security Checks | high |
99078 | OracleVM 3.3 / 3.4 : glibc (OVMSA-2017-0051) | Nessus | OracleVM Local Security Checks | critical |
99070 | Oracle Linux 6 : glibc (ELSA-2017-0680) | Nessus | Oracle Linux Local Security Checks | high |
97958 | CentOS 6 : glibc (CESA-2017:0680) | Nessus | CentOS Local Security Checks | high |
97881 | RHEL 6 : glibc (RHSA-2017:0680) | Nessus | Red Hat Local Security Checks | high |
97254 | GLSA-201702-11 : GNU C Library: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
91341 | Ubuntu 12.04 LTS / 14.04 LTS / 15.10 : eglibc, glibc regression (USN-2985-2) | Nessus | Ubuntu Local Security Checks | high |
91334 | Ubuntu 12.04 LTS / 14.04 LTS / 15.10 : eglibc, glibc vulnerabilities (USN-2985-1) | Nessus | Ubuntu Local Security Checks | high |
91063 | Fedora 23 : glibc-2.22-15.fc23 (2016-68abc0be35) | Nessus | Fedora Local Security Checks | high |
88855 | openSUSE Security Update : glibc (openSUSE-2016-233) | Nessus | SuSE Local Security Checks | critical |
88833 | SUSE SLED11 / SLES11 Security Update : glibc (SUSE-SU-2016:0472-1) | Nessus | SuSE Local Security Checks | critical |
88832 | SUSE SLED12 / SLES12 Security Update : glibc (SUSE-SU-2016:0471-1) | Nessus | SuSE Local Security Checks | critical |
88831 | SUSE SLES11 Security Update : glibc (SUSE-SU-2016:0470-1) | Nessus | SuSE Local Security Checks | critical |
88829 | openSUSE Security Update : glibc (openSUSE-2016-224) | Nessus | SuSE Local Security Checks | critical |
88599 | Debian DLA-411-2 : eglibc regression update | Nessus | Debian Local Security Checks | high |