Lucene search

K
f5F5F5:K16859
HistoryNov 11, 2015 - 12:00 a.m.

K16859 : SUSE coreutils vulnerabilities CVE-2013-0221, CVE-2013-0222, and CVE-2013-0223

2015-11-1100:00:00
my.f5.com
23

6.3 Medium

AI Score

Confidence

High

0.026 Low

EPSS

Percentile

90.3%

Security Advisory Description

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
Impact
This vulnerability may allow context-dependent attackers to cause a denial-of-service (DoS) attack (segmentation fault and crash), by way of a long string, to the sort/uniq/join commands.