Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3999

Опубликовано: 11 янв. 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

Отчет

This issue was rated as having Moderate impact because of the prerequisites required for successful exploitation. To the best of our knowledge, there is no actual setuid exposure to the vulnerable getcwd() usage pattern.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6compat-glibcOut of support scope
Red Hat Enterprise Linux 6glibcOut of support scope
Red Hat Enterprise Linux 7compat-glibcOut of support scope
Red Hat Enterprise Linux 7glibcOut of support scope
Red Hat Enterprise Linux 9glibcNot affected
Red Hat Enterprise Linux 8glibcFixedRHSA-2022:089615.03.2022
Red Hat Enterprise Linux 8glibcFixedRHSA-2022:089615.03.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-193
https://bugzilla.redhat.com/show_bug.cgi?id=2024637glibc: Off-by-one buffer overflow/underflow in getcwd()

EPSS

Процентиль: 78%
0.01166
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

rocky
больше 3 лет назад

Moderate: glibc security update

EPSS

Процентиль: 78%
0.01166
Низкий

7.4 High

CVSS3