Integer Overflow or Wraparound Affecting grep package, versions <0:2.20-3.el6
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.73% (81st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-GREP-2118425
- published 26 Jul 2021
- disclosed 22 Dec 2012
How to fix?
Upgrade Centos:6
grep
to version 0:2.20-3.el6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream grep
package and not the grep
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
References
- http://www.securityfocus.com/bid/57033
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189
- http://git.sv.gnu.org/gitweb/?p=grep.git;a=shortlog;h=v2.11
- https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473
- https://bugzilla.redhat.com/show_bug.cgi?id=889935
- https://access.redhat.com/security/cve/CVE-2012-5667
- http://lists.gnu.org/archive/html/bug-grep/2012-12/msg00004.html
- http://openwall.com/lists/oss-security/2012/12/22/6
- http://rhn.redhat.com/errata/RHSA-2015-1447.html
- https://access.redhat.com/errata/RHSA-2015:1447
- http://git.sv.gnu.org/gitweb/?p=grep.git%3Ba=shortlog%3Bh=v2.11
- https://www.exploit-db.com/exploits/23779