Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1605.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332 | |
http://secunia.com/advisories/55113 | third party advisory |
http://www.ubuntu.com/usn/USN-1991-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/09/12/6 | patch mailing list |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 | vendor advisory |
http://www.securityfocus.com/bid/62324 | vdb entry |
https://security.gentoo.org/glsa/201503-04 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-1411.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 | vendor advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=15857 | exploit |
https://sourceware.org/bugzilla/show_bug.cgi?id=15856 | |
https://sourceware.org/bugzilla/show_bug.cgi?id=15855 | exploit |