SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Glibc Vendors:   GNU [multiple authors]
(Ubuntu Issues Fix) Glibc Buffer Underflow in __realpath() Lets Local Users Execute Arbitrary Code
SecurityTracker Alert ID:  1040226
SecurityTracker URL:  http://securitytracker.com/id/1040226
CVE Reference:   CVE-2018-1000001   (Links to External Site)
Date:  Jan 18 2018
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Glibc. A local user can obtain elevated privileges on the target system.

A local user can trigger a buffer underflow in the __realpath() function in 'stdlib/canonicalize.c' to execute arbitrary code on the target system. This can be exploited against set user id (setuid) root applications to gain root privileges on the target system.

The vulnerability occurs due to a change in the processing of pathnames in the getcwd() command introduced in Linux kernel version 2.6.36.

The original advisory is available at:

https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/

halfdog reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

https://www.ubuntu.com/usn/usn-3534-1

Vendor URL:  www.ubuntu.com/usn/usn-3534-1 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  14.04 LTS, 16.04 LTS, 17.10

Message History:   This archive entry is a follow-up to the message listed below.
Jan 11 2018 Glibc Buffer Underflow in __realpath() Lets Local Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC