Vulnerabilities > CVE-2012-5667 - Numeric Errors vulnerability in GNU Grep
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 19 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Grep < 2.11 Integer Overflow Crash PoC. CVE-2012-5667. Dos exploit for linux platform |
id | EDB-ID:23779 |
last seen | 2016-02-02 |
modified | 2012-12-31 |
published | 2012-12-31 |
reporter | Joshua Rogers |
source | https://www.exploit-db.com/download/23779/ |
title | Grep < 2.11 Integer Overflow Crash PoC |
Nessus
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2015-1447.NASL description Updated grep packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The grep utility searches through textual input for lines that contain a match to a specified pattern and then prints the matching lines. The GNU grep utilities include grep, egrep, and fgrep. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the last seen 2020-06-01 modified 2020-06-02 plugin id 84948 published 2015-07-23 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/84948 title RHEL 6 : grep (RHSA-2015:1447) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2015-1447.NASL description Updated grep packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The grep utility searches through textual input for lines that contain a match to a specified pattern and then prints the matching lines. The GNU grep utilities include grep, egrep, and fgrep. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the last seen 2020-06-01 modified 2020-06-02 plugin id 85022 published 2015-07-28 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85022 title CentOS 6 : grep (CESA-2015:1447) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL69662152.NASL description Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. (CVE-2012-5667) last seen 2020-06-01 modified 2020-06-02 plugin id 101094 published 2017-06-29 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/101094 title F5 Networks BIG-IP : Grep vulnerability (K69662152) NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2015-598.NASL description An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) last seen 2020-06-01 modified 2020-06-02 plugin id 86076 published 2015-09-23 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/86076 title Amazon Linux AMI : grep (ALAS-2015-598) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2015-1447.NASL description From Red Hat Security Advisory 2015:1447 : Updated grep packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The grep utility searches through textual input for lines that contain a match to a specified pattern and then prints the matching lines. The GNU grep utilities include grep, egrep, and fgrep. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the last seen 2020-06-01 modified 2020-06-02 plugin id 85108 published 2015-07-30 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85108 title Oracle Linux 6 : grep (ELSA-2015-1447) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201403-07.NASL description The remote host is affected by the vulnerability described in GLSA-201403-07 (grep: User-assisted execution of arbitrary code) An integer overflow flaw has been discovered in grep. Impact : An attacker could entice a user to run grep on a specially crafted file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 73220 published 2014-03-27 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/73220 title GLSA-201403-07 : grep: User-assisted execution of arbitrary code NASL family Scientific Linux Local Security Checks NASL id SL_20150722_GREP_ON_SL6_X.NASL description An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way grep parsed large lines of data. An attacker able to trick a user into running grep on a specially crafted data file could use this flaw to crash grep or, potentially, execute arbitrary code with the privileges of the user running grep. (CVE-2012-5667) A heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) The grep packages have been upgraded to upstream version 2.20, which provides a number of bug fixes and enhancements over the previous version. Notably, the speed of various operations has been improved significantly. Now, the recursive grep utility uses the fts function of the gnulib library for directory traversal, so that it can handle much larger directories without reporting the last seen 2020-03-18 modified 2015-08-04 plugin id 85194 published 2015-08-04 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85194 title Scientific Linux Security Update : grep on SL6.x i386/x86_64 (20150722) NASL family Solaris Local Security Checks NASL id SOLARIS11_GREP_20131015.NASL description The remote Solaris system is missing necessary patches to address security updates : - Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. (CVE-2012-5667) last seen 2020-06-01 modified 2020-06-02 plugin id 80634 published 2015-01-19 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/80634 title Oracle Solaris Third-Party Patch Update : grep (cve_2012_5667_heap_buffer)
Packetstorm
data source | https://packetstormsecurity.com/files/download/119170/grep-overflow.txt |
id | PACKETSTORM:119170 |
last seen | 2016-12-05 |
published | 2012-12-31 |
reporter | Joshua Rogers |
source | https://packetstormsecurity.com/files/119170/Grep-Integer-Overflow.html |
title | Grep Integer Overflow |
Redhat
advisories |
| ||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | No description provided by source. |
id | SSV:77529 |
last seen | 2017-11-19 |
modified | 2014-07-01 |
published | 2014-07-01 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-77529 |
title | Grep < 2.11 Integer Overflow Crash PoC |
References
- https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473
- https://bugzilla.redhat.com/show_bug.cgi?id=889935
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
- http://openwall.com/lists/oss-security/2012/12/22/6
- http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189
- http://lists.gnu.org/archive/html/bug-grep/2012-12/msg00004.html
- http://www.securityfocus.com/bid/57033
- http://rhn.redhat.com/errata/RHSA-2015-1447.html
- http://git.sv.gnu.org/gitweb/?p=grep.git%3Ba=shortlog%3Bh=v2.11