Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3999

Опубликовано: 24 авг. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.33-4package
glibcfixed2.31-13+deb11u4bullseyepackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=28769

  • https://www.openwall.com/lists/oss-security/2022/01/24/4

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=472e799a5f2102bc0c3206dbd5a801765fceb39c

EPSS

Процентиль: 78%
0.01166
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.4
redhat
больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

rocky
больше 3 лет назад

Moderate: glibc security update

EPSS

Процентиль: 78%
0.01166
Низкий