Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1010023

Опубликовано: 15 июл. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 5.4

Описание

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

ignored

esm-infra/focal

DNE

focal

DNE

precise/esm

ignored

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

ignored

cosmic

ignored

end of life
devel

ignored

disco

ignored

end of life
eoan

ignored

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

esm-infra/focal

ignored

esm-infra/xenial

ignored

focal

ignored

Показывать по

Ссылки на источники

EPSS

Процентиль: 54%
0.00313
Низкий

6.8 Medium

CVSS2

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
больше 6 лет назад

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVSS3: 5.4
nvd
больше 6 лет назад

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVSS3: 5.4
debian
больше 6 лет назад

GNU Libc current is affected by: Re-mapping current loaded library wit ...

CVSS3: 8.8
github
больше 3 лет назад

GNU Libc current is affected by: Re-mapping current loaded libray with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code.

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость компонента libld библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 54%
0.00313
Низкий

6.8 Medium

CVSS2

5.4 Medium

CVSS3