7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
glibc is vulnerable to arbitrary code execution. A local authenticated attacker could write before the destination buffer leading to a buffer underflow and potential code execution due to a confusion in the usage of getcwd() by realpath(). Affected is the function __realpath
in the library stdlib/canonicalize.c
.
CPE | Name | Operator | Version |
---|---|---|---|
glibc | eq | 2.17__157.el7_3.2 | |
glibc | eq | 2.17__157.el7_3.1 | |
glibc | eq | 2.17__196.el7_4.2 | |
glibc | eq | 2.17__157.el7_3.4 | |
glibc | eq | 2.17__157.el7_3.5 | |
glibc | eq | 2.17__196.el7 |
seclists.org/oss-sec/2018/q1/38
www.securityfocus.com/bid/102525
www.securitytracker.com/id/1040162
access.redhat.com/documentation/en-US/red_hat_enterprise_linux/7/html/7.5_release_notes/index.html
access.redhat.com/errata/RHSA-2018:0805
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1348000
bugzilla.redhat.com/show_bug.cgi?id=1349962
bugzilla.redhat.com/show_bug.cgi?id=1349964
bugzilla.redhat.com/show_bug.cgi?id=1372305
bugzilla.redhat.com/show_bug.cgi?id=1398413
bugzilla.redhat.com/show_bug.cgi?id=1432085
bugzilla.redhat.com/show_bug.cgi?id=1435615
bugzilla.redhat.com/show_bug.cgi?id=1440250
bugzilla.redhat.com/show_bug.cgi?id=1443236
bugzilla.redhat.com/show_bug.cgi?id=1445644
bugzilla.redhat.com/show_bug.cgi?id=1445781
bugzilla.redhat.com/show_bug.cgi?id=1447556
bugzilla.redhat.com/show_bug.cgi?id=1448822
bugzilla.redhat.com/show_bug.cgi?id=1452034
bugzilla.redhat.com/show_bug.cgi?id=1463692
bugzilla.redhat.com/show_bug.cgi?id=1468807
bugzilla.redhat.com/show_bug.cgi?id=1471111
bugzilla.redhat.com/show_bug.cgi?id=1482988
bugzilla.redhat.com/show_bug.cgi?id=1484034
bugzilla.redhat.com/show_bug.cgi?id=1508895
bugzilla.redhat.com/show_bug.cgi?id=1527904
bugzilla.redhat.com/show_bug.cgi?id=1528418
bugzilla.redhat.com/show_bug.cgi?id=1529982
bugzilla.redhat.com/show_bug.cgi?id=677316
security.netapp.com/advisory/ntap-20190404-0003/
usn.ubuntu.com/3534-1/
usn.ubuntu.com/3536-1/
www.exploit-db.com/exploits/43775/
www.exploit-db.com/exploits/44889/
www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C