Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2013.0340
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2013-0340)
Summary:The remote host is missing an update for the 'glibc' package(s) announced via the MGASA-2013-0340 advisory.
Description:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the MGASA-2013-0340 advisory.

Vulnerability Insight:
Updated glibc packages fixes the following security issues:

Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc
or libc6) 2.17 and earlier allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a
long string, which triggers a heap-based buffer overflow. (CVE-2012-4412)

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library
(aka glibc or libc6) 2.17 and earlier allows context-dependent
attackers to cause a denial of service (crash) or possibly execute
arbitrary code via a long string that triggers a malloc failure and
use of the alloca function. (CVE-2012-4424)

pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not
properly check permissions for tty files, which allows local users to
change the permission on the files and obtain access to arbitrary
pseudo-terminals by leveraging a FUSE file system. (CVE-2013-2207)
NOTE! This is fixed by removing pt_chown which may break chroots
if their devpts was not mounted correctly.
(make sure to mount the devpts correctly with gid=5)

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6)
2.18 and earlier allows context-dependent attackers to cause a denial
of service (out-of-bounds write and crash) or possibly execute
arbitrary code via a crafted (1) NTFS or (2) CIFS image. (CVE-2013-4237)

Multiple integer overflows in malloc/malloc.c in the GNU C Library
(aka glibc or libc6) 2.18 and earlier allow context-dependent
attackers to cause a denial of service (heap corruption) via a large
value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4)
memalign, or (5) aligned_alloc functions. (CVE-2013-4332)

A stack (frame) overflow flaw, which led to a denial of service
(application crash), was found in the way glibc's getaddrinfo() function
processed certain requests when called with AF_INET6. A similar flaw to
CVE-2013-1914, this affects AF_INET6 rather than AF_UNSPEC (CVE-2013-4458).

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6)
2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize
the random value for the pointer guard, which makes it easier for context-
dependent attackers to control execution flow by leveraging a buffer-
overflow vulnerability in an application and using the known zero value
pointer guard to calculate a pointer address. (CVE-2013-4788)

Other fixes in this update:
- Correct the processing of '\x80' characters in crypt_freesec.c
- drop minimal required kernel to 2.6.32 so it works in chroots on top
of enterprise kernels and for OpenVZ users.
- fix typo in nscd.service

Affected Software/OS:
'glibc' package(s) on Mageia 2, Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-4412
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
http://seclists.org/fulldisclosure/2019/Jun/18
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
https://seclists.org/bugtraq/2019/Jun/14
55113
http://secunia.com/advisories/55113
GLSA-201503-04
https://security.gentoo.org/glsa/201503-04
MDVSA-2013:283
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
MDVSA-2013:284
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
USN-1991-1
http://www.ubuntu.com/usn/USN-1991-1
[oss-security] 20130907 CVE Request -- glibc: strcoll() integer overflow leading to buffer overflow + another alloca() stack overflow issue (upstream #14547 && #14552)
http://www.openwall.com/lists/oss-security/2012/09/07/9
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://sourceware.org/bugzilla/show_bug.cgi?id=14547
https://bugzilla.redhat.com/show_bug.cgi?id=855385
Common Vulnerability Exposure (CVE) ID: CVE-2012-4424
[oss-security] 20130913 CVE Request -- glibc: strcoll() integer overflow leading to buffer overflow + another alloca() stack overflow issue (upstream #14547 && #14552)
http://www.openwall.com/lists/oss-security/2012/09/13/16
https://bugzilla.redhat.com/show_bug.cgi?id=858238
Common Vulnerability Exposure (CVE) ID: CVE-2013-2207
SUSE-SU-2015:1424
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
SUSE-SU-2016:0470
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
USN-2985-1
http://www.ubuntu.com/usn/USN-2985-1
USN-2985-2
http://www.ubuntu.com/usn/USN-2985-2
[libc-alpha] 20130812 The GNU C Library version 2.18 is now available
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
Common Vulnerability Exposure (CVE) ID: CVE-2013-4237
61729
http://www.securityfocus.com/bid/61729
[oss-security] 20130812 Re: CVE Request -- glibc: Buffer overwrite when using readdir_r on file systems returning file names longer than NAME_MAX characters
http://www.openwall.com/lists/oss-security/2013/08/12/8
https://bugzilla.redhat.com/show_bug.cgi?id=995839
https://sourceware.org/bugzilla/show_bug.cgi?id=14699
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3
Common Vulnerability Exposure (CVE) ID: CVE-2013-4332
62324
http://www.securityfocus.com/bid/62324
RHSA-2013:1411
http://rhn.redhat.com/errata/RHSA-2013-1411.html
RHSA-2013:1605
http://rhn.redhat.com/errata/RHSA-2013-1605.html
[oss-security] 20130912 Re: CVE Request: Three integer overflows in glibc memory allocator
http://www.openwall.com/lists/oss-security/2013/09/12/6
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332
https://sourceware.org/bugzilla/show_bug.cgi?id=15855
https://sourceware.org/bugzilla/show_bug.cgi?id=15856
https://sourceware.org/bugzilla/show_bug.cgi?id=15857
Common Vulnerability Exposure (CVE) ID: CVE-2013-4458
[libc-alpha] 20131022 [PATCH][BZ #16072] Fix stack overflow due to large AF_INET6 requests
https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html
https://sourceware.org/bugzilla/show_bug.cgi?id=16072
Common Vulnerability Exposure (CVE) ID: CVE-2013-4788
BugTraq ID: 61183
http://www.securityfocus.com/bid/61183
http://seclists.org/fulldisclosure/2015/Sep/23
http://hmarco.org/bugs/CVE-2013-4788.html
http://www.openwall.com/lists/oss-security/2013/07/15/9
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.