CVE-2008-1391

NameCVE-2008-1391
DescriptionMultiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2058-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)jessie, jessie (lts)2.19-18+deb8u14fixed
stretch (security)2.24-11+deb9u1fixed
stretch (lts), stretch2.24-11+deb9u7fixed
buster (security), buster, buster (lts)2.28-10+deb10u4fixed
bullseye2.31-13+deb11u11fixed
bullseye (security)2.31-13+deb11u10fixed
bookworm2.36-9+deb12u8fixed
bookworm (security)2.36-9+deb12u7fixed
sid, trixie2.40-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)2.11-1low
glibcsourcelenny2.7-18lenny4DSA-2058-1
glibcsource(unstable)2.11-1low
kfreebsd-6source(unstable)(not affected)
kfreebsd-7source(unstable)(not affected)

Notes

- kfreebsd-6 <not-affected> (see bug #483152)
- kfreebsd-7 <not-affected> (see bug #483152)
[lenny] - glibc <no-dsa> (minor issue)
not sure if it is a security bug, an attacker should not be able to change the format string
http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=199eb0de8d
http://sourceware.org/bugzilla/show_bug.cgi?id=10600
PoC php -r 'money_format("%.1073741821i",1);' I can reproduce on 32bit, not 64bit

Search for package or bug name: Reporting problems