Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-35942

Опубликовано: 30 июн. 2021
Источник: redhat
CVSS3: 9.1
EPSS Низкий

Описание

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

An integer overflow flaw was found in glibc that may result in reading of arbitrary memory when wordexp is used with a specially crafted untrusted regular expression input.

Отчет

This is an integer overflow flaw in wordexp(), caused by a specially crafted untrusted regular expression input. It can result in arbitrary memory read. The upstream glibc project generally does not consider bugs due to untrusted inputs as security issues, but this is an exception since it invokes undefined behaviour in glibc. In general, use of untrusted regular expression input is strongly discouraged. This flaw has been rated as having a security impact of Moderate as no application shipped with Red Hat Enterprise Linux passes untrusted data to wordexp() by default.

Меры по смягчению последствий

Do not use untrusted regular expression input for the wordexp() function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6compat-glibcOut of support scope
Red Hat Enterprise Linux 6glibcOut of support scope
Red Hat Enterprise Linux 7compat-glibcOut of support scope
Red Hat Enterprise Linux 7glibcOut of support scope
Red Hat Enterprise Linux 9glibcNot affected
Red Hat Enterprise Linux 8glibcFixedRHSA-2021:435809.11.2021
Red Hat Enterprise Linux 8glibcFixedRHSA-2021:435809.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1977975glibc: Arbitrary read in wordexp()

EPSS

Процентиль: 78%
0.01204
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 4 года назад

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS3: 9.1
nvd
почти 4 года назад

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS3: 9.1
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 9.1
debian
почти 4 года назад

The wordexp function in the GNU C Library (aka glibc) through 2.33 may ...

rocky
больше 3 лет назад

Moderate: glibc security, bug fix, and enhancement update

EPSS

Процентиль: 78%
0.01204
Низкий

9.1 Critical

CVSS3