Vulnerability Details : CVE-2011-1659
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2011-1659
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1659
1.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1659
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-1659
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1659
-
http://code.google.com/p/chromium/issues/detail?id=48733
48733 - Crash in third_party xdg_mime library when unable to handle long file paths - chromium - MonorailExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66819
GNU C Library fnmatch.c denial of service CVE-2011-1659 Vulnerability Report
-
http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485
sourceware.org Git - glibc.git/commitPatch
-
http://sourceware.org/bugzilla/show_bug.cgi?id=12583
12583 – (CVE-2011-1659) fnmatch: integer overflow in computation of the required memory (CVE-2011-1659)Exploit;Patch
-
http://www.securitytracker.com/id?1025450
Glibc Integer Overflow in fnmatch() Lets Remote Users Deny Service - SecurityTracker
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
mandriva.com
-
http://www.securityfocus.com/archive/1/520102/100/0/threaded
SecurityFocus
-
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
VMSA-2011-0012.3
-
http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
Security: I got accidental code execution via glibc?!Exploit
-
https://bugzilla.redhat.com/show_bug.cgi?id=681054
681054 – (CVE-2011-1071, CVE-2011-1659) CVE-2011-1071 CVE-2011-1659 glibc: fnmatch() alloca()-based memory corruption flawExploit;Patch
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
mandriva.com
Jump to