Логотип exploitDog
bind:"CVE-2017-16997" OR bind:"CVE-2018-11236" OR bind:"CVE-2018-6485" OR bind:"CVE-2018-11237"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-16997" OR bind:"CVE-2018-11236" OR bind:"CVE-2018-6485" OR bind:"CVE-2018-11237"

Количество 40

Количество 40

oracle-oval логотип

ELSA-2018-3092

около 7 лет назад

ELSA-2018-3092: glibc security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2017-16997

почти 8 лет назад

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-16997

почти 8 лет назад

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2017-16997

почти 8 лет назад

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-16997

почти 8 лет назад

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2 ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q5m3-4jcg-c4rf

больше 3 лет назад

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-05945

почти 8 лет назад

Уязвимость функций fillin_rpath, decompose_rpath системной библиотеки GNU C Library, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2159-1

больше 7 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:1600-1

больше 7 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1991-1

больше 7 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1562-2

около 7 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1562-1

больше 7 лет назад

Security update for glibc

EPSS: Низкий
ubuntu логотип

CVE-2018-11236

больше 7 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2018-11236

почти 8 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2018-11236

больше 7 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2018-11236

больше 7 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 a ...

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0089-1

почти 8 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0074-1

почти 8 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2302-1

больше 7 лет назад

Security update for glibc

EPSS: Низкий
github логотип

GHSA-pgv4-4294-ccrq

больше 3 лет назад

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2018-3092

ELSA-2018-3092: glibc security, bug fix, and enhancement update (MODERATE)

около 7 лет назад
ubuntu логотип
CVE-2017-16997

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-16997

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2017-16997

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-16997

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2 ...

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
github логотип
GHSA-q5m3-4jcg-c4rf

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-05945

Уязвимость функций fillin_rpath, decompose_rpath системной библиотеки GNU C Library, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
1%
Низкий
почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2159-1

Security update for glibc

больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:1600-1

Security update for glibc

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1991-1

Security update for glibc

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1562-2

Security update for glibc

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1562-1

Security update for glibc

больше 7 лет назад
ubuntu логотип
CVE-2018-11236

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
1%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-11236

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-11236

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-11236

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 a ...

CVSS3: 9.8
1%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0089-1

Security update for glibc

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0074-1

Security update for glibc

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:2302-1

Security update for glibc

1%
Низкий
больше 7 лет назад
github логотип
GHSA-pgv4-4294-ccrq

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу