CVE-2015-8982 in C Library
摘要 (英语)
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
预定
2017-02-14
披露
2017-03-15
状态
已确认
条目
VulDB provides additional information and datapoints for this CVE:
| 标识符 | 漏洞 | CWE | 可利用 | 对策 | CVE |
|---|---|---|---|---|---|
| 98122 | GNU C Library strxfrm 内存损坏 | 190 | 未定义 | 官方修复 | CVE-2015-8982 |