Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11236

Опубликовано: 18 мая 2018
Источник: debian
EPSS Низкий

Описание

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.27-4package
glibcfixed2.24-11+deb9u4stretchpackage
eglibcremovedpackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22786

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2

EPSS

Процентиль: 75%
0.00894
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 7.8
redhat
почти 8 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
nvd
больше 7 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

suse-cvrf
больше 7 лет назад

Security update for glibc

CVSS3: 9.8
github
больше 3 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

EPSS

Процентиль: 75%
0.00894
Низкий