Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandriva: 2013:162: glibc Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple vulnerabilities has been discovered and corrected in glibc: Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string [More...]

 Mandriva Linux Security Advisory                         MDVSA-2013:162

 Package : glibc
 Date    : May 7, 2013
 Affected: Enterprise Server 5.0

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in glibc:
 Integer overflow in the vfprintf function in stdio-common/vfprintf.c
 in glibc 2.14 and other versions allows context-dependent attackers to
 bypass the FORTIFY_SOURCE protection mechanism, conduct format string
 attacks, and write to arbitrary memory via a large number of arguments
 Multiple errors in glibc's formatted printing functionality could
 allow an attacker to bypass FORTIFY_SOURCE protections and execute
 arbitrary code using a format string flaw in an application, even
 though these protections are expected to limit the impact of such flaws
 to an application abort (CVE-2012-3404, CVE-2012-3405, CVE-2012-3406).
 Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold,
 (4) strtod_l, and other unspecified related functions in stdlib in
 GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a
 denial of service (application crash) and possibly execute arbitrary
 code via a long string, which triggers a stack-based buffer overflow
 Buffer overflow in the extend_buffers function in the regular
 expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
 earlier, allows context-dependent attackers to cause a denial of
 service (memory corruption and crash) via crafted multibyte characters
 Stack-based buffer overflow in the getaddrinfo function in
 sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
 2.17 and earlier allows remote attackers to cause a denial of service
 (crash) via a (1) hostname or (2) IP address that triggers a large
 number of domain conversion results (CVE-2013-1914).
 The updated packages have been patched to correct these issues.


 Updated Packages:

 Mandriva Enterprise Server 5:
 87712654b036070964fb35385f398279  mes5/i586/glibc-2.8-1.20080520.5.9mnb2.i586.rpm
 eae25c5265ca4d2dab2dbf8b0450b6a5  mes5/i586/glibc-devel-2.8-1.20080520.5.9mnb2.i586.rpm
 161b6288a6c2b13b299e6e7bdd699eae  mes5/i586/glibc-doc-2.8-1.20080520.5.9mnb2.i586.rpm
 08948383eccf30d736dfeaef53430eab  mes5/i586/glibc-doc-pdf-2.8-1.20080520.5.9mnb2.i586.rpm
 6f1ae9e591ed477bf56c7a3a1f7770be  mes5/i586/glibc-i18ndata-2.8-1.20080520.5.9mnb2.i586.rpm
 7beb9227ce1bbff7fe2848b5fad3b4ca  mes5/i586/glibc-profile-2.8-1.20080520.5.9mnb2.i586.rpm
 2451007d981f0314f675e7edd387003b  mes5/i586/glibc-static-devel-2.8-1.20080520.5.9mnb2.i586.rpm
 e502bca8475975d9e2ce11eec93a10d2  mes5/i586/glibc-utils-2.8-1.20080520.5.9mnb2.i586.rpm
 63241c1d294d1972b3d12206e4d38eb3  mes5/i586/nscd-2.8-1.20080520.5.9mnb2.i586.rpm 
 641edd61d4e607e9ccd4c5b3c8c790ac  mes5/SRPMS/glibc-2.8-1.20080520.5.9mnb2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 4c8e423f7ddc996f087e2fc304329b31  mes5/x86_64/glibc-2.8-1.20080520.5.9mnb2.x86_64.rpm
 e7d749c4c4ffdd3b8320ca4af0f1ed72  mes5/x86_64/glibc-devel-2.8-1.20080520.5.9mnb2.x86_64.rpm
 b5fb6b11ed3bb0ab2ad5168be6371457  mes5/x86_64/glibc-doc-2.8-1.20080520.5.9mnb2.x86_64.rpm
 f4392e4257f604bfb9baf17740e1cc7d  mes5/x86_64/glibc-doc-pdf-2.8-1.20080520.5.9mnb2.x86_64.rpm
 0cddcf4e1d98b60c892ca22741b08d11  mes5/x86_64/glibc-i18ndata-2.8-1.20080520.5.9mnb2.x86_64.rpm
 301995478a3f943d5d0448cbc561e436  mes5/x86_64/glibc-profile-2.8-1.20080520.5.9mnb2.x86_64.rpm
 395f0f667999586e57e296c6b867e616  mes5/x86_64/glibc-static-devel-2.8-1.20080520.5.9mnb2.x86_64.rpm
 0595e256f6c1e2f2c7f94cca21fd4f35  mes5/x86_64/glibc-utils-2.8-1.20080520.5.9mnb2.x86_64.rpm
 ea48c2685180f722187736bc8a624e58  mes5/x86_64/nscd-2.8-1.20080520.5.9mnb2.x86_64.rpm 
 641edd61d4e607e9ccd4c5b3c8c790ac  mes5/SRPMS/glibc-2.8-1.20080520.5.9mnb2.src.rpm

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.