Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000001

Опубликовано: 31 янв. 2018
Источник: debian
EPSS Средний

Описание

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.26-4package
eglibcremovedpackage
eglibcpostponedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2018/01/11/5

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22679

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=52a713fdd0a30e1bd79818e2e3c4ab44ddca1a94

EPSS

Процентиль: 97%
0.45557
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7
redhat
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7.8
nvd
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

suse-cvrf
почти 8 лет назад

Security update for glibc

suse-cvrf
почти 8 лет назад

Security update for glibc

EPSS

Процентиль: 97%
0.45557
Средний