Stack-based Buffer Overflow in GNU C Library Affecting Multiple Linux Distributions
CVE-2015-8779
9.8CRITICAL
Key Information:
- Vendor
- Suse
- Status
- Vendor
- CVE Published:
- 19 April 2016
Summary
A vulnerability exists in the GNU C Library (glibc) prior to version 2.23, where the catopen function is susceptible to a stack-based buffer overflow. This flaw can be exploited by attackers to trigger a denial of service through application crashes. In a more significant scenario, it could lead to the execution of arbitrary code by utilizing a specially crafted long catalog name. This vulnerability highlights the importance of securing library functions to prevent exploitation that can compromise system integrity.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved