CVE-2012-5667
Published Jan 3, 2013
Last updated a year ago
Overview
- Description
- Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:grep:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AB79442-59A9-4E47-8F4E-5A55F01C0EC4", "versionEndIncluding": "2.10" }, { "criteria": "cpe:2.3:a:gnu:grep:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B4C7727-C33E-48A6-86ED-5089AD66C287" }, { "criteria": "cpe:2.3:a:gnu:grep:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "563A6D81-32C4-4B80-96D3-1AD7BBAFC335" }, { "criteria": "cpe:2.3:a:gnu:grep:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF9C9855-2E69-4191-B653-AA413FBEB60F" }, { "criteria": "cpe:2.3:a:gnu:grep:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCFE8E0-6319-4E5A-8FE7-96FD689BAA0F" }, { "criteria": "cpe:2.3:a:gnu:grep:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB4D9B0A-D171-4DB6-8F40-2F04B0604EBE" }, { "criteria": "cpe:2.3:a:gnu:grep:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2CF8DD8-C3D4-440E-82B0-F7209EE04741" }, { "criteria": "cpe:2.3:a:gnu:grep:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE2F6E3-63A2-4A8B-9046-9353E81720C9" }, { "criteria": "cpe:2.3:a:gnu:grep:2.5.1:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8754E619-694E-4EC8-AD85-E4781CCC68BB" }, { "criteria": "cpe:2.3:a:gnu:grep:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E709A76-5882-4E33-8DBE-9C9C07DC1F9E" }, { "criteria": "cpe:2.3:a:gnu:grep:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46E1072B-1506-4650-9983-96E2044C29FE" }, { "criteria": "cpe:2.3:a:gnu:grep:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85739D66-5EBE-46FB-80FA-13C2295319C4" }, { "criteria": "cpe:2.3:a:gnu:grep:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "024E63FA-8AF0-4BAB-8857-8212629A937E" }, { "criteria": "cpe:2.3:a:gnu:grep:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F539435-3232-414F-B4C7-690BDC96D33E" }, { "criteria": "cpe:2.3:a:gnu:grep:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34051D6D-BF77-4494-8C25-76F6D906A35D" }, { "criteria": "cpe:2.3:a:gnu:grep:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDAC2DD8-0E69-4B30-8292-C9AD74823664" }, { "criteria": "cpe:2.3:a:gnu:grep:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F80043A-BECF-4C94-8BE3-D966873D8053" }, { "criteria": "cpe:2.3:a:gnu:grep:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DE47159-054C-47C3-AA62-421967F9DF42" } ], "operator": "OR" } ] } ]