Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1752

Опубликовано: 17 янв. 2020
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

A use-after-free vulnerability was found in glibc in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution.

Отчет

The Red Hat Product Security Team has rated this issue as having Moderate security impact. This flaw did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5 and 6, as the vulnerable code was introduced in a later version of the package. Red Hat Enterprise Linux 7 is approaching the End of Maintenance Support 1 Phase of the support and maintenance life cycle. The flaw is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7, hence marked as "Will not fix". For further information, please refer to the Red Hat Enterprise Linux Life Cycle and Issue Severity Classification: [1] https://access.redhat.com/support/policy/updates/errata [2] https://access.redhat.com/security/updates/classification

Меры по смягчению последствий

Avoid the expansion of overly long directory paths.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7glibcWill not fix
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020
Red Hat Enterprise Linux 8glibcFixedRHSA-2020:444404.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1810718glibc: use-after-free in glob() function when expanding ~user

EPSS

Процентиль: 37%
0.00152
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
около 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
nvd
около 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7
debian
около 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2. ...

suse-cvrf
около 5 лет назад

Security update for glibc

EPSS

Процентиль: 37%
0.00152
Низкий

7 High

CVSS3