CVE-2015-1472
Description
The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in glibc's wscanf via the ADDW macro in vfscanf.c allows denial of service or unspecified impact on systems before glibc 2.21.
Vulnerability
The vulnerability resides in the ADDW macro within stdio-common/vfscanf.c of the GNU C Library (glibc) before version 2.21. The macro does not properly account for the size of the wide-character data type during memory allocation, leading to a potential buffer overflow when processing a long line containing wide characters. This flaw is triggered through a wscanf call [2] [3] [4].
Exploitation
An attacker needs only the ability to supply a specially crafted input string containing a long sequence of wide characters to a program using wscanf. No special authentication or network position is required beyond the ability to deliver the input to the vulnerable function. The exploitation occurs through the misuse of the ADDW macro, which fails to allocate sufficient buffer space [2] [3] [4].
Impact
Successful exploitation results in a buffer overflow, leading to a denial of service (DoS) due to memory corruption. The official description also notes the possibility of "unspecified other impact," which could include arbitrary code execution depending on the context [2] [3] [4].
Mitigation
The vulnerability is fixed in glibc version 2.21, released on 2015-02-06. Systems running glibc earlier than 2.21 should upgrade immediately. No workarounds are documented; the only mitigation is to apply the updated library [2] [3] [4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
11cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- osv-coords5 versionspkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 2.24-2.3+ 4 more
- (no CPE)range: < 2.24-2.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- openwall.com/lists/oss-security/2015/02/04/1nvd
- packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.htmlnvd
- packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.htmlnvd
- seclists.org/fulldisclosure/2019/Jun/18nvd
- seclists.org/fulldisclosure/2019/Sep/7nvd
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/72428nvd
- www.ubuntu.com/usn/USN-2519-1nvd
- seclists.org/bugtraq/2019/Jun/14nvd
- seclists.org/bugtraq/2019/Sep/7nvd
- security.gentoo.org/glsa/201602-02nvd
- sourceware.org/git/gitweb.cginvd
News mentions
0No linked articles in our index yet.