Lucene search

K

14 matches found

CVE
CVE
added 2019/11/19 10:15 p.m.342 views

CVE-2019-19126

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR...

3.3CVSS4.8AI score0.00016EPSS
CVE
CVE
added 2019/01/21 7:29 p.m.331 views

CVE-2016-10739

In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possi...

5.3CVSS5AI score0.00038EPSS
CVE
CVE
added 2019/02/26 2:29 a.m.318 views

CVE-2019-9169

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

9.8CVSS9.3AI score0.1003EPSS
CVE
CVE
added 2019/02/26 6:29 p.m.235 views

CVE-2019-9192

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\1\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior...

7.5CVSS5.2AI score0.01996EPSS
CVE
CVE
added 2019/07/15 4:15 a.m.232 views

CVE-2019-1010022

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is...

9.8CVSS9.5AI score0.00145EPSS
CVE
CVE
added 2019/07/15 4:15 a.m.209 views

CVE-2019-1010023

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream ...

8.8CVSS7.8AI score0.00703EPSS
CVE
CVE
added 2019/02/26 2:29 a.m.197 views

CVE-2009-5155

In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

7.5CVSS6.9AI score0.01374EPSS
CVE
CVE
added 2019/07/15 4:15 a.m.194 views

CVE-2019-1010025

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

5.3CVSS5.5AI score0.00235EPSS
CVE
CVE
added 2019/07/15 4:15 a.m.192 views

CVE-2019-1010024

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

5.3CVSS5.5AI score0.00375EPSS
CVE
CVE
added 2019/02/26 2:29 a.m.163 views

CVE-2018-20796

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\1\1|t1|\\2537)+' in grep.

7.5CVSS5.2AI score0.01996EPSS
CVE
CVE
added 2019/02/03 2:29 a.m.132 views

CVE-2019-7309

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

5.5CVSS5.6AI score0.0013EPSS
CVE
CVE
added 2019/01/18 7:29 p.m.86 views

CVE-2019-6488

The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in _...

7.8CVSS5.6AI score0.00099EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.65 views

CVE-2005-3590

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

9.8CVSS9.6AI score0.00492EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.48 views

CVE-2006-7254

The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

5.5CVSS5.3AI score0.00042EPSS