漏洞信息详情
GNU C Library‘__gconv_translit_find()’函数差一错误漏洞
- CNNVD编号:CNNVD-201407-742
- 危害等级: 高危
- CVE编号:
CVE-2014-5119
- 漏洞类型:
数字错误
- 发布时间:
2014-07-31
- 威胁类型:
远程
- 更新时间:
2020-04-01
- 厂 商:
gnu - 漏洞来源:
Tavis Ormandy -
漏洞简介
GNU C Library(又名glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。
GNU C Library(aka glibc)的gconv_trans.c文件中的‘__gconv_translit_find’函数的‘CHARSET’环境变量和‘gconv’音译模块中存在差一错误漏洞。攻击者可利用该漏洞造成拒绝服务(崩溃)或执行任意代码。
参考网址
来源:REDHAT
链接:https://rhn.redhat.com/errata/RHSA-2014-1110.html
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
来源:SECUNIA
链接:http://secunia.com/advisories/61093
来源:MISC
链接:https://code.google.com/p/google-security-research/issues/detail?id=96
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2014/Aug/69
来源:CISCO
链接:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119
来源:CONFIRM
链接:http://www-01.ibm.com/support/docview.wss?uid=swg21685604
来源:GENTOO
链接:https://security.gentoo.org/glsa/201602-02
来源:BID
链接:https://www.securityfocus.com/bid/68983
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2014/07/14/1
来源:SECUNIA
链接:http://secunia.com/advisories/60358
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2014/08/13/5
来源:SECUNIA
链接:http://secunia.com/advisories/60345
来源:CONFIRM
链接:https://sourceware.org/bugzilla/show_bug.cgi?id=17187
来源:BID
链接:https://www.securityfocus.com/bid/69738
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2014-1118.html
来源:DEBIAN
链接:https://www.debian.org/security/2014/dsa-3012
来源:CONFIRM
链接:http://linux.oracle.com/errata/ELSA-2015-0092.html
来源:MISC
链接:http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
来源:SECUNIA
链接:http://secunia.com/advisories/60441
来源:SECUNIA