Show filters
152 Total Results
Displaying 61-70 of 152
Sort by:
Attacker Value
Unknown

CVE-2017-1000409

Disclosure Date: February 01, 2018 (last updated November 26, 2024)
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
0
Attacker Value
Unknown

CVE-2017-1000408

Disclosure Date: February 01, 2018 (last updated November 26, 2024)
A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
0
Attacker Value
Unknown

CVE-2018-1000001

Disclosure Date: January 31, 2018 (last updated November 26, 2024)
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
0
Attacker Value
Unknown

CVE-2017-16997

Disclosure Date: December 18, 2017 (last updated November 26, 2024)
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
0
Attacker Value
Unknown

CVE-2017-17426

Disclosure Date: December 05, 2017 (last updated November 08, 2023)
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
0
Attacker Value
Unknown

CVE-2017-15804

Disclosure Date: October 22, 2017 (last updated November 08, 2023)
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
0
Attacker Value
Unknown

CVE-2017-15671

Disclosure Date: October 20, 2017 (last updated November 26, 2024)
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
0
Attacker Value
Unknown

CVE-2017-15670

Disclosure Date: October 20, 2017 (last updated November 26, 2024)
The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
0
Attacker Value
Unknown

CVE-2011-5320

Disclosure Date: October 18, 2017 (last updated November 08, 2023)
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
0
Attacker Value
Unknown

CVE-2017-12133

Disclosure Date: September 07, 2017 (last updated November 08, 2023)
Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
0