Vulnerability Details : CVE-2013-0222
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-0222
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 23 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0222
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2013-0222
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0222
-
https://bugzilla.redhat.com/show_bug.cgi?id=903465
903465 – (CVE-2013-0222) CVE-2013-0222 coreutils: segfault in uniq with long line inputIssue Tracking;Third Party Advisory
-
https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19
Request 149348 - openSUSE Build ServiceThird Party Advisory
-
https://bugzilla.novell.com/show_bug.cgi?id=796243
Bug 796243 – VUL-1: CVE-2013-0222: coreutils: segmentation fault in "uniq" with long line inputIssue Tracking;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1652.html
RHSA-2013:1652 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Products affected by CVE-2013-0222
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*