Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-1391

Published: 27 March 2008

Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.

Notes

AuthorNote
kees
originally limited to NetBSD
php -r 'money_format("%1073741821i",1);'
php -r 'money_format("%#1073741821i",1);'
php -r 'money_format("%.1073741821i",1);'

Priority

Medium

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic
Released (2.10.1-0ubuntu17)
lucid Not vulnerable
(2.11.1-0ubuntu5)
upstream Needed

Patches:
proposed: http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/strfmon.c.diff?r1=1.6&r2=1.7
upstream: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=199eb0de8d


glibc
Launchpad, Ubuntu, Debian
dapper
Released (2.3.6-0ubuntu20.6)
hardy
Released (2.7-10ubuntu6)
intrepid Ignored
(end of life, was needed)
jaunty
Released (2.9-4ubuntu6.2)
karmic Does not exist

lucid Does not exist

upstream Needed

Patches:


proposed: http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/strfmon.c.diff?r1=1.6&r2=1.7
upstream: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=199eb0de8d