Description
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3169-1 | eglibc security update |
EUVD |
EUVD-2012-3375 | The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers. |
Ubuntu USN |
USN-1589-1 | GNU C Library vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T20:05:12.567Z
Reserved: 2012-06-14T00:00:00.000Z
Link: CVE-2012-3404
No data.
Status : Modified
Published: 2014-02-10T18:15:10.013
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-3404
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN