CVE-2008-1391

Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
freebsdfreebsd
6.0
freebsdfreebsd
6.0:release
freebsdfreebsd
6.0:stable
freebsdfreebsd
6.0_p5_release:_p5_release
freebsdfreebsd
7.0
freebsdfreebsd
7.0:pre-release
freebsdfreebsd
7.0_beta4:_beta4
freebsdfreebsd
7.0_releng:_releng
netbsdnetbsd
4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
glibc
bullseye
2.31-13+deb11u11
fixed
lenny
no-dsa
bullseye (security)
2.31-13+deb11u10
fixed
bookworm
2.36-9+deb12u8
fixed
bookworm (security)
2.36-9+deb12u7
fixed
sid
2.40-3
fixed
trixie
2.40-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
eglibc
lucid
not-affected
karmic
Fixed 2.10.1-0ubuntu17
released
jaunty
dne
intrepid
dne
hardy
dne
dapper
dne
glibc
lucid
dne
karmic
dne
jaunty
Fixed 2.9-4ubuntu6.2
released
intrepid
ignored
hardy
Fixed 2.7-10ubuntu6
released
dapper
Fixed 2.3.6-0ubuntu20.6
released
Common Weakness Enumeration
References