Buffer overflow in Glibc - CVE-2015-1473

 

Buffer overflow in Glibc - CVE-2015-1473

Published: November 28, 2016 / Updated: June 3, 2025


Vulnerability identifier: #VU110108
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-1473
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: GNU
Affected software:
Glibc

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.


How to mitigate CVE-2015-1473

Install update from vendor's website.

Sources