7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
glibc is vulnerable to arbitrary code execution. A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system.
packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
seclists.org/fulldisclosure/2019/Sep/7
www.debian.org/security/2017/dsa-3887
www.securityfocus.com/bid/99127
www.securitytracker.com/id/1038712
access.redhat.com/errata/RHSA-2017:1479
access.redhat.com/errata/RHSA-2017:1480
access.redhat.com/errata/RHSA-2017:1481
access.redhat.com/errata/RHSA-2017:1567
access.redhat.com/errata/RHSA-2017:1712
access.redhat.com/security/cve/CVE-2017-1000366
access.redhat.com/security/updates/classification/#important
access.redhat.com/security/vulnerabilities/stackguard
kc.mcafee.com/corporate/index?page=content&id=SB10205
seclists.org/bugtraq/2019/Sep/7
security.gentoo.org/glsa/201706-19
www.exploit-db.com/exploits/42274/
www.exploit-db.com/exploits/42275/
www.exploit-db.com/exploits/42276/
www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
www.suse.com/security/cve/CVE-2017-1000366/
www.suse.com/support/kb/doc/?id=7020973
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C