iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
References
Link | Resource |
---|---|
http://www.debian.org/security/2015/dsa-3142 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:175 | Broken Link |
http://www.openwall.com/lists/oss-security/2014/08/29/3 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/09/02/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/69472 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2432-1 | Third Party Advisory |
https://security.gentoo.org/glsa/201503-04 | |
https://sourceware.org/bugzilla/show_bug.cgi?id=14134 | Exploit Issue Tracking |
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2014-12-05 16:59
Updated : 2024-02-04 18:35
NVD link : CVE-2012-6656
Mitre link : CVE-2012-6656
CVE.ORG link : CVE-2012-6656
JSON object : View
Products Affected
gnu
- glibc
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation