Vigil@nce - glibc: buffer overflow of __gconv_translit_find
August 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in the
__gconv_translit_find() function of the glibc, in order to trigger
a denial of service, and possibly to execute code.
Impacted products: Debian, Fedora, Ubuntu, Unix (platform)
Severity: 1/4
Creation date: 26/08/2014
DESCRIPTION OF THE VULNERABILITY
The __gconv_translit_find() function of the glibc is used to
convert locales.
However, if the size of the filename reaches the limit of the size
of the storage array, an overflow of one byte occurs.
An attacker can therefore generate a buffer overflow in the
__gconv_translit_find() function of the glibc, in order to trigger
a denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/glibc-buffer-overflow-of-gconv-translit-find-15229