Buffer Access with Incorrect Length Value Affecting glibc package, versions [,2.15)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.67% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GLIBC-2319116
  • published14 Dec 2021
  • disclosed10 Feb 2014
  • creditUnknown

Introduced: 10 Feb 2014

CVE-2012-3405  (opens in a new tab)
CWE-805  (opens in a new tab)

How to fix?

Upgrade glibc to version 2.15 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Access with Incorrect Length Value. The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.

CVSS Base Scores

version 3.1