Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
Vector
NETWORK
Complexity
LOW
Authentication
NONE
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL
Gnu Glibc 2.12.0 (not an official CPE)
GNU glibc 2.11.3
GNU glibc 2.11.2
GNU glibc 2.11.1
GNU glibc 2.11
Gnu Glibc 2.10.2 (not an official CPE)
GNU glibc 2.10.1
Gnu Glibc 2.10 (not an official CPE)
GNU glibc 2.9
GNU glibc 2.8
GNU glibc 2.7
GNU glibc 2.6.1
GNU glibc 2.6
GNU glibc 2.5.1
GNU glibc 2.5
GNU glibc 2.4
GNU glibc 2.3.10
GNU glibc 2.3.6
GNU glibc 2.3.5
GNU glibc 2.3.4
GNU glibc 2.3.3
GNU glibc 2.3.2
GNU glibc 2.3.1
GNU glibc 2.3
GNU glibc 2.2.5
GNU glibc 2.2.4
GNU glibc 2.2.3
GNU glibc 2.2.2
GNU glibc 2.2.1
GNU glibc 2.2
GNU glibc 2.1.9
Gnu Glibc 2.1.3.10 (not an official CPE)
GNU glibc 2.1.3
GNU glibc 2.1.2
GNU glibc 2.1.1.6
GNU glibc 2.1.1
GNU glibc 2.1
GNU glibc 2.0.6
GNU glibc 2.0.5
GNU glibc 2.0.4
GNU glibc 2.0.3
GNU glibc 2.0.2
GNU glibc 2.0.1
GNU glibc 2.0
Gnu Glibc 1.09.1 (not an official CPE)
Gnu Glibc 1.09 (not an official CPE)
Gnu Glibc 1.08 (not an official CPE)
Gnu Glibc 1.07 (not an official CPE)
Gnu Glibc 1.06 (not an official CPE)
Gnu Glibc 1.05 (not an official CPE)
Gnu Glibc 1.04 (not an official CPE)
Gnu Glibc 1.03 (not an official CPE)
Gnu Glibc 1.02 (not an official CPE)
Gnu Glibc 1.01 (not an official CPE)
Gnu Glibc 1.00 (not an official CPE)
GNU glibc 2.12.1
GNU glibc 2.12.2
GNU glibc 2.13