CVE-2012-3480

Priority
Description
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4)
strtod_l, and other unspecified "related functions" in stdlib in GNU C
Library (aka glibc or libc6) 2.16 allow local users to cause a denial of
service (application crash) and possibly execute arbitrary code via a long
string, which triggers a stack-based buffer overflow.
Notes
jdstrandstack-protector should prevent code execution
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu19)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. For more details see https://wiki.ubuntu.com/Security/Features#stack-protector
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. For more details see https://wiki.ubuntu.com/Security/Features#stack-protector
More Information

Updated: 2020-09-10 02:11:14 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)