CVE-2011-2702
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
27/10/2014
Last modified:
12/04/2025
Description
Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | 2.12.2 (including) | |
| cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:* | 2.12 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2011/q3/123
- http://seclists.org/oss-sec/2011/q3/153
- http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032
- http://www.nodefense.org/eglibc.txt
- http://www.osvdb.org/80718
- http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/
- https://bugzilla.novell.com/show_bug.cgi?id=706915
- https://sourceware.org/git/?p=glibc.git%3Ba%3Dcommit%3Bh%3Da0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e
- http://seclists.org/oss-sec/2011/q3/123
- http://seclists.org/oss-sec/2011/q3/153
- http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032
- http://www.nodefense.org/eglibc.txt
- http://www.osvdb.org/80718
- http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/
- https://bugzilla.novell.com/show_bug.cgi?id=706915
- https://sourceware.org/git/?p=glibc.git%3Ba%3Dcommit%3Bh%3Da0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e



