CVE-2016-1234
Summary
| CVE | CVE-2016-1234 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-06-01 20:59:00 UTC |
| Updated | 2023-11-07 02:29:00 UTC |
| Description | Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| openSUSE-SU-2016:1779-1: moderate: Security update for glibc |
SUSE |
lists.opensuse.org |
Issue Tracking, Patch, Third Party Advisory |
| [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 |
|
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| oss-security - CVE-2016-1234 in glibc glob with GLOB_ALTDIRFUNC |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| GNU glibc CVE-2016-1234 Local Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| sourceware.org Git - glibc.git/commit |
CONFIRM |
sourceware.org |
Exploit, Third Party Advisory |
| [SECURITY] Fedora 23 Update: glibc-2.22-15.fc23 |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices |
FULLDISC |
seclists.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 |
|
lists.apache.org |
|
| 19779 – (CVE-2016-1234) glob: buffer overflow with GLOB_ALTDIRFUNC due to incorrect NAME_MAX limit assumption (CVE-2016-1234) |
CONFIRM |
sourceware.org |
Exploit, Issue Tracking, Third Party Advisory |
| openSUSE-SU-2016:1527-1: moderate: Security update for glibc |
SUSE |
lists.opensuse.org |
Issue Tracking, Patch, Third Party Advisory |
| GNU C Library: Multiple vulnerabilities (GLSA 201702-11) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| sourceware.org Git - glibc.git/commit |
|
sourceware.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671092 EulerOS Security Update for glibc (EulerOS-SA-2019-2155)
- 710558 Gentoo Linux GNU C Library Multiple Vulnerabilities (GLSA 201702-11)