Out-of-Bounds

Affecting glibc package, versions debian:10: <2.26-4 || debian:8: * || debian:9: * || debian:unstable: <2.26-4 || ubuntu:16.04: <2.23-0ubuntu10 || ubuntu:17.10: <2.26-0ubuntu2.1

Do your applications use this vulnerable package? Test your applications

Overview

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

References

CVSS Score

7.8
high severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2018-1000001
CWE
CWE-119
Snyk ID
SNYK-LINUX-GLIBC-129450
Disclosed
10 Jan, 2018
Published
10 Jan, 2018