Vulnerability Description
GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | - |
References
- http://www.securityfocus.com/bid/109167Third Party AdvisoryVDB Entry
- https://security-tracker.debian.org/tracker/CVE-2019-1010023
- https://sourceware.org/bugzilla/show_bug.cgi?id=22851ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medi
- https://ubuntu.com/security/CVE-2019-1010023
- http://www.securityfocus.com/bid/109167Third Party AdvisoryVDB Entry
- https://security-tracker.debian.org/tracker/CVE-2019-1010023
- https://sourceware.org/bugzilla/show_bug.cgi?id=22851ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medi
- https://ubuntu.com/security/CVE-2019-1010023
FAQ
What is CVE-2019-1010023?
CVE-2019-1010023 is a vulnerability with a CVSS score of 5.4 (MEDIUM). GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is...
How severe is CVE-2019-1010023?
CVE-2019-1010023 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010023?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.