Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-1752

Опубликовано: 30 апр. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.7
CVSS3: 7

Описание

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

released

2.27-3ubuntu1.2
devel

not-affected

2.31-0ubuntu9
eoan

released

2.30-0ubuntu2.2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.27-3ubuntu1.2
esm-infra/focal

not-affected

2.31-0ubuntu9
esm-infra/xenial

not-affected

2.23-0ubuntu11.2
focal

not-affected

2.31-0ubuntu9
groovy

not-affected

2.31-0ubuntu9
hirsute

not-affected

2.31-0ubuntu9

Показывать по

EPSS

Процентиль: 37%
0.00152
Низкий

3.7 Low

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
больше 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
nvd
около 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVSS3: 7
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7
debian
около 5 лет назад

A use-after-free vulnerability introduced in glibc upstream version 2. ...

suse-cvrf
около 5 лет назад

Security update for glibc

EPSS

Процентиль: 37%
0.00152
Низкий

3.7 Low

CVSS2

7 High

CVSS3

Уязвимость CVE-2020-1752