Vulnerability CVE-2017-1000366


Published: 2017-06-19

Description:
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

See advisories in our WLB2 database:
Topic
Author
Date
High
GNU C Library ld.so Memory Leak / Buffer Overflow
Qualys
13.12.2017

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Redhat
Product: Enterprise linux server eus 
Version:
7.2
6.5
6.2
Product: Enterprise linux 
Version:
7.0
6
5
Product: Enterprise linux eus 
Version: 6.7;
Product: Enterprise linux aus 
Version: 6.6;
Product: Enterprise linux server 
Version: 6.6;
Product: Enterprise linux server tus 
Version: 6.5;
Product: Enterprise linux server long life 
Version: 5.9;
Vendor: Openstack
Product: Cloud magnum orchestration 
Version: 7;
Vendor: Opensuse project
Product: LEAP 
Version: 42.2;
Vendor: Opensuse
Product: LEAP 
Version: 42.2;
Vendor: GNU
Product: Glibc 
Version: 2.25; 2.2.5;
Vendor: SUSE
Product: Linux enterprise software development kit 
Version: 12.0; 11.0;
Product: Linux enterprise server for raspberry pi 
Version: 12;
Product: Linux enterprise for sap 
Version: 12;
Product: Linux enterprise server 
Version:
12
11
10
Vendor: Novell
Product: Suse linux enterprise desktop 
Version: 12.0;
Product: Suse linux enterprise server 
Version: 11.0;
Product: Suse linux enterprise point of sale 
Version: 11.0;

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://www.debian.org/security/2017/dsa-3887
http://www.securityfocus.com/bid/99127
http://www.securitytracker.com/id/1038712
https://access.redhat.com/errata/RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000366
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://security.gentoo.org/glsa/201706-19
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000366/
https://www.suse.com/support/kb/doc/?id=7020973

Related CVE
CVE-2016-9597
It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression C...
CVE-2017-9277
The LDAP backend in Novell eDirectory before 9.0 SP4 when switched to EBA (Enhanced Background Authentication) kept open connections without EBA.
CVE-2017-9267
In Novell eDirectory before 9.0.3.1 the LDAP interface was not strictly enforcing cipher restrictions allowing weaker ciphers to be used during SSL BIND operations.
CVE-2017-14491
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
CVE-2017-14496
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
CVE-2017-14493
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
CVE-2017-14494
dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
CVE-2017-13704
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platf...

Copyright 2019, cxsecurity.com

 

Back to Top