CVE-2013-4357
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
31/12/2019
Last modified:
14/01/2020
Description
The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:eglibc:eglibc:*:*:*:*:*:*:*:* | 2.14 (excluding) | |
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:* | ||
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html
- http://www.openwall.com/lists/oss-security/2013/09/17/4
- http://www.openwall.com/lists/oss-security/2013/09/17/8
- http://www.openwall.com/lists/oss-security/2015/01/28/18
- http://www.openwall.com/lists/oss-security/2015/01/29/21
- http://www.openwall.com/lists/oss-security/2015/02/24/3
- http://www.securityfocus.com/bid/67992
- http://www.ubuntu.com/usn/USN-2306-1
- http://www.ubuntu.com/usn/USN-2306-2
- http://www.ubuntu.com/usn/USN-2306-3
- https://access.redhat.com/security/cve/cve-2013-4357
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95103
- https://security-tracker.debian.org/tracker/CVE-2013-4357