Search for vulnerabilities
Vulnerability details: VCID-auxa-7x98-aaas
Vulnerability ID VCID-auxa-7x98-aaas
Aliases CVE-2012-3405
Summary The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2012:1098
rhas Moderate https://access.redhat.com/errata/RHSA-2012:1200
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00666 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.00778 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01065 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
epss 0.01206 https://api.first.org/data/v1/epss?cve=CVE-2012-3405
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2012-3405
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2012-1098.html
http://rhn.redhat.com/errata/RHSA-2012-1200.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json
https://api.first.org/data/v1/epss?cve=CVE-2012-3405
https://bugzilla.redhat.com/show_bug.cgi?id=833704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=13446
http://www.openwall.com/lists/oss-security/2012/07/11/17
http://www.ubuntu.com/usn/USN-1589-1
681473 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
CVE-2012-3405 https://nvd.nist.gov/vuln/detail/CVE-2012-3405
RHSA-2012:1098 https://access.redhat.com/errata/RHSA-2012:1098
RHSA-2012:1200 https://access.redhat.com/errata/RHSA-2012:1200
USN-1589-1 https://usn.ubuntu.com/1589-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2012-3405
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.70059
EPSS Score 0.00666
Published At May 9, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.