Do your applications use this vulnerable package?
Test your applications
Overview
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
References
CVSS Score
7.8
high severity
-
Attack VectorLocal
-
Attack ComplexityLow
-
Privileges RequiredLow
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2018-1000001
- CWE
- CWE-787
- Snyk ID
- SNYK-DEBIAN9-GLIBC-356851
- Disclosed
- 10 Jan, 2018
- Published
- 10 Jan, 2018