Vulnerability Description
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 5 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 5.9 |
| Redhat | Enterprise Linux Server Eus | 6.2 |
| Redhat | Enterprise Linux Server Long Life | 5.9 |
| Redhat | Enterprise Linux Server Tus | 6.5 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Openstack | Cloud Magnum Orchestration | 7 |
| Novell | Suse Linux Enterprise Desktop | 12.0 |
| Novell | Suse Linux Enterprise Point Of Sale | 11.0 |
| Novell | Suse Linux Enterprise Server | 11.0 |
| Opensuse | Leap | 42.2 |
| Suse | Linux Enterprise For Sap | 12 |
| Suse | Linux Enterprise Server | 10 |
| Suse | Linux Enterprise Server For Raspberry Pi | 12 |
| Suse | Linux Enterprise Software Development Kit | 11.0 |
| Gnu | Glibc | <= 2.25 |
| Debian | Debian Linux | 8.0 |
| Mcafee | Web Gateway | <= 7.6.2.14 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-G
- http://seclists.org/fulldisclosure/2019/Sep/7
- http://www.debian.org/security/2017/dsa-3887Third Party Advisory
- http://www.securityfocus.com/bid/99127Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038712Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1479Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1480Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1481Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1567Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1712Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2017-1000366Third Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205PatchThird Party Advisory
- https://seclists.org/bugtraq/2019/Sep/7
- https://security.gentoo.org/glsa/201706-19Third Party Advisory
- https://www.exploit-db.com/exploits/42274/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-1000366?
CVE-2017-1000366 is a vulnerability with a CVSS score of 7.8 (HIGH). glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note ...
How severe is CVE-2017-1000366?
CVE-2017-1000366 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000366?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus.