CVE-2011-2702

GNU Glibc < 2.12.2 - Code Injection

Title source: rule
STIX 2.1

Description

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

Exploits (1)

exploitdb WRITEUP VERIFIED
by c0ntex · textdoslinux
https://www.exploit-db.com/exploits/20167

References (8)

Core 8
Core References
Issue Tracking x_refsource_misc
https://bugzilla.novell.com/show_bug.cgi?id=706915
Mailing List mailing-list x_refsource_mlist
http://seclists.org/oss-sec/2011/q3/123
Various Sources x_refsource_misc
http://www.nodefense.org/eglibc.txt
Mailing List mailing-list x_refsource_mlist
http://seclists.org/oss-sec/2011/q3/153
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/80718

Scores

EPSS 0.0335
EPSS Percentile 87.4%

Details

CWE
CWE-94
Status published
Products (4)
gnu/eglibc < 2.12
gnu/glibc 2.12
gnu/glibc 2.12.1
gnu/glibc < 2.12.2
Published Oct 27, 2014
Tracked Since Feb 18, 2026