{"id":"CVE-2012-3406","details":"The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not \"properly restrict the use of\" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.","modified":"2026-04-16T06:17:51.833005875Z","published":"2014-02-10T18:15:10Z","related":["SUSE-SU-2015:0551-1","openSUSE-SU-2024:10154-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1097.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1098.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1185.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1200.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1589-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201503-04"},{"type":"REPORT","url":"https://bugzilla.redhat.com/attachment.cgi?id=594722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/07/11/17"}],"schema_version":"1.7.5"}