Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19126

Опубликовано: 19 нояб. 2019
Источник: redhat
CVSS3: 2.9
EPSS Низкий

Описание

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcOut of support scope
Red Hat Enterprise Linux 6glibcOut of support scope
Red Hat Enterprise Linux 7glibcFixedRHSA-2020:386129.09.2020
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:182828.04.2020
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:182828.04.2020
Red Hat OpenShift Doopenshiftdo/odo-init-image-rhel7FixedRHSA-2021:094922.03.2021

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1774681glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries

EPSS

Процентиль: 3%
0.00016
Низкий

2.9 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 6 лет назад

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

CVSS3: 3.3
nvd
около 6 лет назад

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

CVSS3: 3.3
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 3.3
debian
около 6 лет назад

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 ...

suse-cvrf
около 6 лет назад

Security update for glibc

EPSS

Процентиль: 3%
0.00016
Низкий

2.9 Low

CVSS3