9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
GNU C Library is vulnerable to arbitrary code execution attacks. This occurs in the stdlib/canonicalize.c
when processing very long pathname arguments to the realpath function which may encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and potentially arbitrary code execution.
www.securityfocus.com/bid/104255
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index
access.redhat.com/errata/RHBA-2019:0327
access.redhat.com/errata/RHSA-2018:3092
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1349967
bugzilla.redhat.com/show_bug.cgi?id=1349982
bugzilla.redhat.com/show_bug.cgi?id=1372304
bugzilla.redhat.com/show_bug.cgi?id=1401665
bugzilla.redhat.com/show_bug.cgi?id=1408964
bugzilla.redhat.com/show_bug.cgi?id=1448107
bugzilla.redhat.com/show_bug.cgi?id=1461231
bugzilla.redhat.com/show_bug.cgi?id=1471405
bugzilla.redhat.com/show_bug.cgi?id=1476120
bugzilla.redhat.com/show_bug.cgi?id=1505451
bugzilla.redhat.com/show_bug.cgi?id=1505477
bugzilla.redhat.com/show_bug.cgi?id=1505492
bugzilla.redhat.com/show_bug.cgi?id=1505500
bugzilla.redhat.com/show_bug.cgi?id=1505647
bugzilla.redhat.com/show_bug.cgi?id=1531168
bugzilla.redhat.com/show_bug.cgi?id=1560641
bugzilla.redhat.com/show_bug.cgi?id=1563046
bugzilla.redhat.com/show_bug.cgi?id=1563747
bugzilla.redhat.com/show_bug.cgi?id=1564638
bugzilla.redhat.com/show_bug.cgi?id=1566623
bugzilla.redhat.com/show_bug.cgi?id=1579727
security.netapp.com/advisory/ntap-20190329-0001/
security.netapp.com/advisory/ntap-20190401-0001/
sourceware.org/bugzilla/show_bug.cgi?id=22786
sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2
usn.ubuntu.com/4416-1/
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P