Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000366

Опубликовано: 19 июн. 2017
Источник: debian
EPSS Низкий

Описание

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.24-12package
eglibcremovedpackage

Примечания

  • https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

EPSS

Процентиль: 92%
0.08164
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

CVSS3: 7.4
redhat
больше 8 лет назад

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

CVSS3: 7.8
nvd
больше 8 лет назад

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

suse-cvrf
больше 8 лет назад

Security update for glibc

suse-cvrf
больше 8 лет назад

Security update for glibc

EPSS

Процентиль: 92%
0.08164
Низкий
Уязвимость CVE-2017-1000366