GNU gettext "get_string ()" Integer Overflow Vulnerability
Release date: 2014-12-02
Updated on: 2014-6 6
Affected Systems:
GNU gettext 0.19.3
Description:
Gettext is used for system internationalization (I18N) and localization (L10N ).
GNU gettext 0.19.3 and other versions have the integer overflow vulnerability in the implementation of the "get_string ()" function (gettext-tools/src/read-mo.c), which can cause buffer overflow after successful exploitation.
<* Source: Jakub Wilk
Link: http://secunia.com/advisories/62491/
*>
Suggestion:
Vendor patch:
GNU
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.gnu.org
GNU gettext:
Http://git.savannah.gnu.org/cgit/gettext.git/commit? Id = abf93d1305d1fc59142d2231ec5f94286038a98a
Jakub Wilk:
Https://bugs.debian.org/cgi-bin/bugreport.cgi? Bug = 769901
This article permanently updates the link address: