Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-16997
HistoryDec 17, 2017 - 12:00 a.m.

CVE-2017-16997

2017-12-1700:00:00
ubuntu.com
ubuntu.com
12

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

34.9%

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26
mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or
AT_SECURE) program, which allows local users to gain privileges via a
Trojan horse library in the current working directory, related to the
fillin_rpath and decompose_rpath functions. This is associated with
misinterpretion of an empty RPATH/RUNPATH token as the “./” directory.
NOTE: this configuration of RPATH/RUNPATH for a privileged program is
apparently very uncommon; most likely, no such program is shipped with any
common Linux distribution.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarcheglibc< 2.19-0ubuntu6.14UNKNOWN
ubuntu17.10noarchglibc< 2.26-0ubuntu2.1UNKNOWN
ubuntu16.04noarchglibc< 2.23-0ubuntu10UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

34.9%