Vulnerability Details : CVE-2011-5320
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-5320
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 35 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-5320
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST |
6.2
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.5
|
3.6
|
NIST |
CWE ids for CVE-2011-5320
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5320
-
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
sourceware.org Git - glibc.git/commitdiffIssue Tracking
-
https://marc.info/?l=gimp-developer&m=129567990905823&w=2
'[Gimp-developer] scanfs without field width limits making Gimp crash' - MARCExploit
-
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=20b38e0
sourceware.org Git - glibc.git/commitdiffIssue Tracking
-
https://bugzilla.redhat.com/show_bug.cgi?id=1196745
1196745 – (CVE-2011-5320) CVE-2011-5320 glibc: scanf implementation crashes on certain inputsThird Party Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4
13138 – scanf crashes on very long numbersIssue Tracking
-
http://www.openwall.com/lists/oss-security/2015/03/12/14
oss-security - Re: CVE request: glibc scanf implementation crashes on certain inputsThird Party Advisory
Products affected by CVE-2011-5320
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*