Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000001

Опубликовано: 11 янв. 2018
Источник: redhat
CVSS3: 7
EPSS Средний

Описание

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

Отчет

This vulnerability affected the glibc package on Red Hat Enterprise Linux 7.4, however it can only be exploited when mount namespaces owned by user namespaces are enabled, which requires manually configuring a kernel parameter and sysctl that are not enabled by default. Please see the Bugzilla link for more details. This vulnerability affects glibc on Red Hat Enterprise Linux 6. However the kernel included in Red Hat Enterprise Linux 6 does not violate glibc's assumption about the behaviour of getcwd(), so this vulnerability can not be exploited when running with the default kernel. Red Hat Enterprise Linux 6 containers may be vulnerable when running on a host with kernel 2.6.36 or greater.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5compat-glibcNot affected
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcWill not fix
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected
Red Hat Enterprise Linux 7glibcFixedRHSA-2018:080510.04.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1533836glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation

EPSS

Процентиль: 97%
0.45557
Средний

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7.8
nvd
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7.8
debian
почти 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() ...

suse-cvrf
почти 8 лет назад

Security update for glibc

suse-cvrf
почти 8 лет назад

Security update for glibc

EPSS

Процентиль: 97%
0.45557
Средний

7 High

CVSS3

Уязвимость CVE-2018-1000001