SB2013050208 - Multiple vulnerabilities in GNU Glibc
Published: May 2, 2013 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2009-5029)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
2) Resource management error (CVE-ID: CVE-2011-4609)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.
Remediation
Install update from vendor's website.
References
- http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/
- http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html
- http://sourceware.org/git/?p=glibc.git;a=commit;h=97ac2654b2d831acaa18a2b018b0736245903fd2
- http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html
- https://bugzilla.redhat.com/show_bug.cgi?id=761245
- https://bugzilla.redhat.com/show_bug.cgi?id=767299