Stack-based buffer overflow in fprintf in musl before 0.8.8 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string to an unbuffered stream such as stderr.
References
Configurations
History
21 Nov 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.etalabs.net/musl/download.html - | |
References | () http://www.openwall.com/lists/musl/2012/04/17/1 - | |
References | () http://www.openwall.com/lists/oss-security/2012/04/18/5 - | |
References | () http://www.openwall.com/lists/oss-security/2012/04/18/6 - | |
References | () http://www.securityfocus.com/bid/53144 - |
Information
Published : 2012-08-31 22:55
Updated : 2024-11-21 01:38
NVD link : CVE-2012-2114
Mitre link : CVE-2012-2114
CVE.ORG link : CVE-2012-2114
JSON object : View
Products Affected
etalabs
- musl
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer