Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2011-4599

Back to Search

SUSE Linux Security Vulnerability: CVE-2011-4599

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/21/2012
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.

Solution(s)

  • suse-upgrade-icu
  • suse-upgrade-icu-data
  • suse-upgrade-libicu
  • suse-upgrade-libicu-32bit
  • suse-upgrade-libicu-devel
  • suse-upgrade-libicu-devel-32bit
  • suse-upgrade-libicu-doc
  • suse-upgrade-libicu-x86
  • suse-upgrade-libreoffice
  • suse-upgrade-libreoffice-af
  • suse-upgrade-libreoffice-ar
  • suse-upgrade-libreoffice-ca
  • suse-upgrade-libreoffice-cs
  • suse-upgrade-libreoffice-da
  • suse-upgrade-libreoffice-de
  • suse-upgrade-libreoffice-el
  • suse-upgrade-libreoffice-en-gb
  • suse-upgrade-libreoffice-es
  • suse-upgrade-libreoffice-fi
  • suse-upgrade-libreoffice-fr
  • suse-upgrade-libreoffice-galleries
  • suse-upgrade-libreoffice-gnome
  • suse-upgrade-libreoffice-gu-in
  • suse-upgrade-libreoffice-hi-in
  • suse-upgrade-libreoffice-hu
  • suse-upgrade-libreoffice-it
  • suse-upgrade-libreoffice-ja
  • suse-upgrade-libreoffice-kde
  • suse-upgrade-libreoffice-ko
  • suse-upgrade-libreoffice-mono
  • suse-upgrade-libreoffice-nb
  • suse-upgrade-libreoffice-nl
  • suse-upgrade-libreoffice-nn
  • suse-upgrade-libreoffice-pl
  • suse-upgrade-libreoffice-pt-br
  • suse-upgrade-libreoffice-ru
  • suse-upgrade-libreoffice-sk
  • suse-upgrade-libreoffice-sv
  • suse-upgrade-libreoffice-xh
  • suse-upgrade-libreoffice-zh-cn
  • suse-upgrade-libreoffice-zh-tw
  • suse-upgrade-libreoffice-zu
  • suse-upgrade-sle-sdk-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;