Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000001

Опубликовано: 31 янв. 2018
Источник: debian
EPSS Средний

Описание

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.26-4package
eglibcremovedpackage
eglibcpostponedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2018/01/11/5

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22679

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=52a713fdd0a30e1bd79818e2e3c4ab44ddca1a94

EPSS

Процентиль: 97%
0.3368
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7
redhat
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7.8
nvd
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

suse-cvrf
около 8 лет назад

Security update for glibc

suse-cvrf
около 8 лет назад

Security update for glibc

EPSS

Процентиль: 97%
0.3368
Средний