Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-3590

Опубликовано: 10 апр. 2019
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5compat-glibcNot affected
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1706046glibc: buffer overflow in getgrouplist function leading to corrupted memory

EPSS

Процентиль: 65%
0.00492
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVSS3: 9.8
nvd
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVSS3: 9.8
debian
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version ...

CVSS3: 9.8
github
больше 3 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

EPSS

Процентиль: 65%
0.00492
Низкий

5.6 Medium

CVSS3