Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2011-5320

Published: 18 October 2017

scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.

Notes

AuthorNote
seth-arnold
other long strings also crash scanf but only 0 is representable,
the standard is slightly lenient here. Second patch may not be strictly
necessary, see the discussion at the bug report for opinions.

Priority

Low

Cvss 3 Severity Score

6.2

Score breakdown

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise Not vulnerable
(2.15-0ubuntu10.11)
trusty Not vulnerable
(2.19-0ubuntu6.6)
upstream
Released (2.15)
utopic Does not exist

vivid Does not exist

Patches:
upstream: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
upstream: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=20b38e0


glibc
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream
Released (2.15)
utopic Not vulnerable
(2.19-10ubuntu2.3)
vivid Not vulnerable
(2.19-15ubuntu2)
Patches:


upstream: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
upstream: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=20b38e0

Severity score breakdown

Parameter Value
Base score 6.2
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H