2018-01-14
ALT-BU-2018-3005-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2018-01-07
BDU:2018-00415
Уязвимость функций getcwd и realpath библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю выполнить произвольный код
Severity: HIGH (7.8)
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: HIGH (7.2)
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
References:
Published: 2018-01-31
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-1000001
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
Severity: HIGH (7.2)
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: HIGH (7.8)
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://seclists.org/oss-sec/2018/q1/38
- http://www.securityfocus.com/bid/102525
- http://www.securitytracker.com/id/1040162
- https://access.redhat.com/errata/RHSA-2018:0805
- https://security.netapp.com/advisory/ntap-20190404-0003/
- https://usn.ubuntu.com/3534-1/
- https://usn.ubuntu.com/3536-1/
- https://www.exploit-db.com/exploits/43775/
- https://www.exploit-db.com/exploits/44889/
- https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
- http://seclists.org/oss-sec/2018/q1/38
- http://www.securityfocus.com/bid/102525
- http://www.securitytracker.com/id/1040162
- https://access.redhat.com/errata/RHSA-2018:0805
- https://security.netapp.com/advisory/ntap-20190404-0003/
- https://usn.ubuntu.com/3534-1/
- https://usn.ubuntu.com/3536-1/
- https://www.exploit-db.com/exploits/43775/
- https://www.exploit-db.com/exploits/44889/
- https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/