Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
2013-10-09T22:55:02.477
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | glibc | ≤ 2.17 | Yes |
Application | gnu | glibc | 2.0 | Yes |
Application | gnu | glibc | 2.0.1 | Yes |
Application | gnu | glibc | 2.0.2 | Yes |
Application | gnu | glibc | 2.0.3 | Yes |
Application | gnu | glibc | 2.0.4 | Yes |
Application | gnu | glibc | 2.0.5 | Yes |
Application | gnu | glibc | 2.0.6 | Yes |
Application | gnu | glibc | 2.1 | Yes |
Application | gnu | glibc | 2.1.1 | Yes |
Application | gnu | glibc | 2.1.1.6 | Yes |
Application | gnu | glibc | 2.1.2 | Yes |
Application | gnu | glibc | 2.1.3 | Yes |
Application | gnu | glibc | 2.1.9 | Yes |
Application | gnu | glibc | 2.10.1 | Yes |
Application | gnu | glibc | 2.11 | Yes |
Application | gnu | glibc | 2.11.1 | Yes |
Application | gnu | glibc | 2.11.2 | Yes |
Application | gnu | glibc | 2.11.3 | Yes |
Application | gnu | glibc | 2.12.1 | Yes |
Application | gnu | glibc | 2.12.2 | Yes |
Application | gnu | glibc | 2.13 | Yes |
Application | gnu | glibc | 2.14 | Yes |
Application | gnu | glibc | 2.14.1 | Yes |
Application | gnu | glibc | 2.15 | Yes |
Application | gnu | glibc | 2.16 | Yes |