Stack-based Buffer Overflow in GNU C Library Affecting Multiple Linux Distributions
CVE-2015-8779

9.8CRITICAL

Summary

A vulnerability exists in the GNU C Library (glibc) prior to version 2.23, where the catopen function is susceptible to a stack-based buffer overflow. This flaw can be exploited by attackers to trigger a denial of service through application crashes. In a more significant scenario, it could lead to the execution of arbitrary code by utilizing a specially crafted long catalog name. This vulnerability highlights the importance of securing library functions to prevent exploitation that can compromise system integrity.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.