Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1752

Опубликовано: 17 янв. 2020
Источник: redhat
CVSS3: 7

Описание

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

A use-after-free vulnerability was found in glibc in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution.

Отчет

The Red Hat Product Security Team has rated this issue as having Moderate security impact. This flaw did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5 and 6, as the vulnerable code was introduced in a later version of the package. Red Hat Enterprise Linux 7 is approaching the End of Maintenance Support 1 Phase of the support and maintenance life cycle. The flaw is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7, hence marked as "Will not fix". For further information, please refer to the Red Hat Enterprise Linux Life Cycle and Issue Severity Classification: [1] https://access.redhat.com/support/policy/updates/errata [2] https://access.redhat.com/security/updates/classification

Меры по смягчению последствий

Avoid the expansion of overly long directory paths.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7glibcWill not fix
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1810718glibc: use-after-free in glob() function when expanding ~user

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
nvd
больше 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 7
debian
больше 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2. ...

suse-cvrf
больше 5 лет назад

Security update for glibc

7 High

CVSS3