DescriptionMultiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, web search, more)
NVD severityhigh (attack range: remote)
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
eglibc (PTS)squeeze2.11.3-4fixed
squeeze (lts)2.11.3-4+deb6u10fixed
wheezy (security), wheezy2.13-38+deb7u8fixed
glibc (PTS)jessie2.19-18+deb8u2fixed
stretch, sid2.21-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-6source(unstable)(not affected)
kfreebsd-7source(unstable)(not affected)


- kfreebsd-6 <not-affected> (see bug #483152)
- kfreebsd-7 <not-affected> (see bug #483152)
[lenny] - glibc <no-dsa> (minor issue)
not sure if it is a security bug, an attacker should not be able to change the format string;a=commitdiff;h=199eb0de8d
PoC php -r 'money_format("%.1073741821i",1);' I can reproduce on 32bit, not 64bit

Search for package or bug name: Reporting problems