Upstream information

CVE-2009-4880 at MITRE


Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and earlier allow context-dependent attackers to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to CVE-2008-1391.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Note from the SUSE Security Team

This problem requires an attacker to inject strfmon format strings, which is highly unlikely. Also the impact is at most a out of memory situation and would so be spotted. For these reasons we consider these issues minor and will not release fixes at this time.

SUSE Bugzilla entry: 611607 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.