ID CVE-2017-1000366
Summary glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux 5 (Server)
    cpe:2.3:o:redhat:enterprise_linux:5:-:server
  • Red Hat Enterprise Linux 6
    cpe:2.3:o:redhat:enterprise_linux:6
  • Red Hat Enterprise Linux (RHEL) 7.0 (7)
    cpe:2.3:o:redhat:enterprise_linux:7.0
  • cpe:2.3:o:redhat:enterprise_linux_aus:6.6
    cpe:2.3:o:redhat:enterprise_linux_aus:6.6
  • cpe:2.3:o:redhat:enterprise_linux_eus:6.7
    cpe:2.3:o:redhat:enterprise_linux_eus:6.7
  • cpe:2.3:o:redhat:enterprise_linux_server:6.6
    cpe:2.3:o:redhat:enterprise_linux_server:6.6
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2
    cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5
    cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5
  • Red Hat Enterprise Linux Server EUS 7.2
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2
  • cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9
    cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5
    cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5
  • cpe:2.3:a:openstack:cloud_magnum_orchestration:7
    cpe:2.3:a:openstack:cloud_magnum_orchestration:7
  • cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2
    cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2
  • cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3
    cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3
  • Novell SUSE Linux Enterprise Server 11.0 Service Pack 3 Long Term Service Pack Support
    cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:-:-:ltss
  • OpenSUSE Project Leap 42.2
    cpe:2.3:o:opensuse_project:leap:42.2
  • cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1
    cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1
  • SUSE Linux Enterprise Server 10 Service Pack 4 Long Term Service Pack Support
    cpe:2.3:o:suse:linux_enterprise_server:10:sp4:-:-:ltss
  • SUSE Linux Enterprise Server 11 Service Pack 4
    cpe:2.3:o:suse:linux_enterprise_server:11:sp4
  • cpe:2.3:o:suse:linux_enterprise_server:12:sp1:-:-:ltss
    cpe:2.3:o:suse:linux_enterprise_server:12:sp1:-:-:ltss
  • cpe:2.3:o:suse:linux_enterprise_server:12:sp2
    cpe:2.3:o:suse:linux_enterprise_server:12:sp2
  • cpe:2.3:o:suse:linux_enterprise_server:12:sp2:-:-:ltss
    cpe:2.3:o:suse:linux_enterprise_server:12:sp2:-:-:ltss
  • cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2
    cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4
    cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2
    cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2
  • GNU glibc 2.25
    cpe:2.3:a:gnu:glibc:2.25
CVSS
Base: 7.2
Impact:
Exploitability:
CWE CWE-119
CAPEC
  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
  • Overflow Binary Resource File
    An attack of this type exploits a buffer overflow vulnerability in the handling of binary resources. Binary resources may include music files like MP3, image files like JPEG files, and any other binary file. These attacks may pass unnoticed to the client machine through normal usage of files, such as a browser loading a seemingly innocent JPEG file. This can allow the attacker access to the execution stack and execute arbitrary code in the target process. This attack pattern is a variant of standard buffer overflow attacks using an unexpected vector (binary files) to wrap its attack and open up a new attack vector. The attacker is required to either directly serve the binary content to the victim, or place it in a locale like a MP3 sharing application, for the victim to download. The attacker then is notified upon the download or otherwise locates the vulnerability opened up by the buffer overflow.
  • Buffer Overflow via Symbolic Links
    This type of attack leverages the use of symbolic links to cause buffer overflows. An attacker can try to create or manipulate a symbolic link file such that its contents result in out of bounds data. When the target software processes the symbolic link file, it could potentially overflow internal buffers with insufficient bounds checking.
  • Overflow Variables and Tags
    This type of attack leverages the use of tags or variables from a formatted configuration data to cause buffer overflow. The attacker crafts a malicious HTML page or configuration file that includes oversized strings, thus causing an overflow.
  • Buffer Overflow via Parameter Expansion
    In this attack, the target software is given input that the attacker knows will be modified and expanded in size during processing. This attack relies on the target software failing to anticipate that the expanded data may exceed some internal limit, thereby creating a buffer overflow.
  • Buffer Overflow in an API Call
    This attack targets libraries or shared code modules which are vulnerable to buffer overflow attacks. An attacker who has access to an API may try to embed malicious code in the API function call and exploit a buffer overflow vulnerability in the function's implementation. All clients that make use of the code library thus become vulnerable by association. This has a very broad effect on security across a system, usually affecting more than one software process.
  • Buffer Overflow in Local Command-Line Utilities
    This attack targets command-line utilities available in a number of shells. An attacker can leverage a vulnerability found in a command-line utility to escalate privilege to root.
exploit-db via4
  • description Linux - 'ldso_dynamic' Local Root Stack Clash Exploit. CVE-2017-1000366,CVE-2017-1000371. Local exploit for Lin_x86 platform
    file exploits/linux_x86/local/42276.c
    id EDB-ID:42276
    last seen 2017-06-29
    modified 2017-06-28
    platform linux_x86
    port
    published 2017-06-28
    reporter Exploit-DB
    source https://www.exploit-db.com/download/42276/
    title Linux - 'ldso_dynamic' Local Root Stack Clash Exploit
    type local
  • description glibc ld.so - Memory Leak / Buffer Overflow. CVE-2017-1000408,CVE-2017-1000409. Local exploit for Linux platform. Tags: Local
    file exploits/linux/local/43331.txt
    id EDB-ID:43331
    last seen 2017-12-13
    modified 2017-12-13
    platform linux
    port
    published 2017-12-13
    reporter Exploit-DB
    source https://www.exploit-db.com/download/43331/
    title glibc ld.so - Memory Leak / Buffer Overflow
    type local
  • description Linux - 'ldso_hwcap' Local Root Stack Clash Exploit. CVE-2017-1000366,CVE-2017-1000370. Local exploit for Lin_x86 platform
    file exploits/linux_x86/local/42274.c
    id EDB-ID:42274
    last seen 2017-06-29
    modified 2017-06-28
    platform linux_x86
    port
    published 2017-06-28
    reporter Exploit-DB
    source https://www.exploit-db.com/download/42274/
    title Linux - 'ldso_hwcap' Local Root Stack Clash Exploit
    type local
  • description Linux - 'ldso_hwcap_64' Local Root Stack Clash Exploit. CVE-2017-1000366,CVE-2017-1000379. Local exploit for Lin_x86-64 platform
    file exploits/linux_x86-64/local/42275.c
    id EDB-ID:42275
    last seen 2017-06-29
    modified 2017-06-28
    platform linux_x86-64
    port
    published 2017-06-28
    reporter Exploit-DB
    source https://www.exploit-db.com/download/42275/
    title Linux - 'ldso_hwcap_64' Local Root Stack Clash Exploit
    type local
nessus via4
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2017-0124.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Mitigation for CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 102062
    published 2017-07-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102062
    title OracleVM 3.2 : glibc (OVMSA-2017-0124) (Stack Clash)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2017-181-01.NASL
    description New glibc packages are available for Slackware 14.2 and -current to fix security issues.
    last seen 2018-01-27
    modified 2018-01-26
    plugin id 101169
    published 2017-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101169
    title Slackware 14.2 / current : glibc (SSA:2017-181-01) (Stack Clash)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1481.NASL
    description From Red Hat Security Advisory 2017:1481 : An update for glibc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-02-02
    modified 2018-02-01
    plugin id 100887
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100887
    title Oracle Linux 7 : glibc (ELSA-2017-1481) (Stack Clash)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-D80AB96E61.NASL
    description This update addresses CVE-2017-1000366, a vulnerability in the dynamic linker allowing local privilege escalation. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-04
    modified 2018-02-02
    plugin id 101731
    published 2017-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101731
    title Fedora 26 : glibc (2017-d80ab96e61) (Stack Clash)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-698DAEF73C.NASL
    description This update addresses CVE-2017-1000366, a vulnerability in the dynamic linker allowing local privilege escalation. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-02
    modified 2018-02-01
    plugin id 101069
    published 2017-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101069
    title Fedora 24 : glibc (2017-698daef73c) (Stack Clash)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170619_GLIBC_ON_SL6_X.NASL
    description Security Fix(es) : - A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)
    last seen 2018-01-27
    modified 2018-01-26
    plugin id 100903
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100903
    title Scientific Linux Security Update : glibc on SL6.x i386/x86_64 (Stack Clash)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201706-19.NASL
    description The remote host is affected by the vulnerability described in GLSA-201706-19 (GNU C Library: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in the GNU C Library. Please review the CVE identifiers and Qualys’ security advisory referenced below for details. Impact : An attacker could possibly execute arbitrary code with the privileges of the process, escalate privileges or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2018-01-27
    modified 2018-01-26
    plugin id 100945
    published 2017-06-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100945
    title GLSA-201706-19 : GNU C Library: Multiple vulnerabilities (Stack Clash)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-992.NASL
    description The Qualys Research Labs discovered various problems in the dynamic linker of the GNU C Library which allow local privilege escalation by clashing the stack. For the full details, please refer to their advisory published at: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt For Debian 7 'Wheezy', these problems have been fixed in version 2.13-38+deb7u12. We recommend that you upgrade your eglibc packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100875
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100875
    title Debian DLA-992-1 : eglibc security update (Stack Clash)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170619_GLIBC_ON_SL7_X.NASL
    description Security Fix(es) : - A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)
    last seen 2018-01-27
    modified 2018-01-26
    plugin id 100904
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100904
    title Scientific Linux Security Update : glibc on SL7.x x86_64 (Stack Clash)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1614-1.NASL
    description This update for glibc fixes the following issues : - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] - The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690] - An incorrectly specified buffer length in nscd netgroup queries has been fixed. [bsc#986858] Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-01
    modified 2018-01-31
    plugin id 100913
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100913
    title SUSE SLES12 Security Update : glibc (SUSE-SU-2017:1614-1) (Stack Clash)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1611-1.NASL
    description This update for glibc fixes the following issues : - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] - The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690] - A defect in glibc's regression test suite has been remedied to avoid false positives. [bsc#987216] Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-01
    modified 2018-01-31
    plugin id 100911
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100911
    title SUSE SLES12 Security Update : glibc (SUSE-SU-2017:1611-1) (Stack Clash)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-715.NASL
    description This update for glibc fixes the following issues : - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] - A bug in glibc that could result in deadlocks between malloc() and fork() has been fixed. [bsc#1040043] This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2018-01-27
    modified 2018-01-26
    plugin id 101126
    published 2017-06-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101126
    title openSUSE Security Update : glibc (openSUSE-2017-715) (Stack Clash)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3887.NASL
    description The Qualys Research Labs discovered various problems in the dynamic linker of the GNU C Library which allow local privilege escalation by clashing the stack. For the full details, please refer to their advisory published at: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100878
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100878
    title Debian DSA-3887-1 : glibc - security update (Stack Clash)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1480.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100935
    published 2017-06-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100935
    title CentOS 6 : glibc (CESA-2017:1480) (Stack Clash)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-79414FEFA1.NASL
    description This update addresses CVE-2017-1000366, a vulnerability in the dynamic linker allowing local privilege escalation. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-04
    modified 2018-02-02
    plugin id 101015
    published 2017-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101015
    title Fedora 25 : glibc (2017-79414fefa1) (Stack Clash)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-1480.NASL
    description From Red Hat Security Advisory 2017:1480 : An update for glibc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-02-02
    modified 2018-02-01
    plugin id 100886
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100886
    title Oracle Linux 6 : glibc (ELSA-2017-1480) (Stack Clash)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3323-1.NASL
    description It was discovered that the GNU C library did not properly handle memory when processing environment variables for setuid programs. A local attacker could use this in combination with another vulnerability to gain administrative privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-01-31
    modified 2018-01-30
    plugin id 100921
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100921
    title Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : eglibc, glibc vulnerability (USN-3323-1) (Stack Clash)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-844.NASL
    description Glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. (CVE-2017-1000366)
    last seen 2018-04-19
    modified 2018-04-18
    plugin id 100873
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100873
    title Amazon Linux AMI : glibc (ALAS-2017-844) (Stack Clash)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3323-2.NASL
    description USN-3323-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that the GNU C library did not properly handle memory when processing environment variables for setuid programs. A local attacker could use this in combination with another vulnerability to gain administrative privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2017-10-29
    modified 2017-06-30
    plugin id 101148
    published 2017-06-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101148
    title Ubuntu 12.04 LTS : eglibc vulnerability (USN-3323-2) (Stack Clash)
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL20486351.NASL
    description glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.(CVE-2017-1000366) Impact This vulnerability allows unauthorized disclosure of information, unauthorized modification, and disruption of service.
    last seen 2018-05-30
    modified 2018-05-24
    plugin id 110057
    published 2018-05-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110057
    title F5 Networks BIG-IP : glibc vulnerability (K20486351) (Stack Clash)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-1481.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100936
    published 2017-06-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100936
    title CentOS 7 : glibc (CESA-2017:1481) (Stack Clash)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1480.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100891
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100891
    title RHEL 6 : glibc (RHSA-2017:1480) (Stack Clash)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1481.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100892
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100892
    title RHEL 7 : glibc (RHSA-2017:1481) (Stack Clash)
  • NASL family Misc.
    NASL id MCAFEE_WEB_GATEWAY_SB10205.NASL
    description The remote host is running a version of McAfee Web Gateway (MWG) that is affected by multiple security vulnerabilities : - A memory corruption flaw exists in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products that allows remote attackers to execute arbitrary code. (CVE-2012-6706) - A memory corruption flaw exists in Linux Kernel versions 4.11.5 and earlier that allows remote attacks to execute arbitrary code with elevated privileges.(CVE-2017-1000364) - A memory corruption flaw exists in the handling of LD_LIBRARY_PATH that allows a remote attacker to manipulate the heap/stack that may lead to arbitrary code execution. This issue only affects GNU glibc 2.25 and prior. (CVE-2017-1000366) - An input validation flaw exists in Todd Miller's sudo version 1.8.20p1 and earlier that results in information disclosure and arbitrary command execution. (CVE-2017-1000368)
    last seen 2017-10-29
    modified 2017-10-09
    plugin id 102496
    published 2017-08-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102496
    title McAfee Web Gateway 7.6.x < 7.6.2.15 / 7.7.x < 7.7.2.3 Multiple Vulnerabilities (SB10205)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1621-1.NASL
    description This update for glibc fixes the following issues : - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-01
    modified 2018-01-31
    plugin id 100918
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100918
    title SUSE SLES11 Security Update : glibc (SUSE-SU-2017:1621-1) (Stack Clash)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1480.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue. Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-06-14
    modified 2018-06-13
    plugin id 101481
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101481
    title Virtuozzo 6 : glibc / glibc-common / glibc-devel / glibc-headers / etc (VZLSA-2017-1480)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-1479.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, and Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue.
    last seen 2018-01-30
    modified 2018-01-29
    plugin id 100890
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100890
    title RHEL 6 / 7 : glibc (RHSA-2017:1479) (Stack Clash)
  • NASL family Junos Local Security Checks
    NASL id JUNIPER_SPACE_JSA_10826.NASL
    description According to its self-reported version number, the version of Junos Space running on the remote device is < 17.1R1, and is therefore affected by multiple vulnerabilities.
    last seen 2017-10-29
    modified 2017-10-26
    plugin id 104100
    published 2017-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104100
    title Juniper Junos Space < 17.1R1 Multiple Vulnerabilities (JSA10826)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1147.NASL
    description According to the versions of the glibc packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.(CVE-2014-9402) - glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.(CVE-2017-1000366) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-06-14
    modified 2018-06-13
    plugin id 102234
    published 2017-08-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102234
    title EulerOS 2.0 SP2 : glibc (EulerOS-SA-2017-1147)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1146.NASL
    description According to the versions of the glibc packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.(CVE-2014-9402) - glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.(CVE-2017-1000366) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-06-14
    modified 2018-06-13
    plugin id 102233
    published 2017-08-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102233
    title EulerOS 2.0 SP1 : glibc (EulerOS-SA-2017-1146)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-1619-1.NASL
    description This update for glibc fixes the following issues : - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] - A bug in glibc that could result in deadlocks between malloc() and fork() has been fixed. [bsc#1040043] Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-02-01
    modified 2018-01-31
    plugin id 100917
    published 2017-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=100917
    title SUSE SLED12 / SLES12 Security Update : glibc (SUSE-SU-2017:1619-1) (Stack Clash)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2017-1481.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366) Red Hat would like to thank Qualys Research Labs for reporting this issue. Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-06-14
    modified 2018-06-13
    plugin id 101482
    published 2017-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101482
    title Virtuozzo 7 : glibc / glibc-common / glibc-devel / glibc-headers / etc (VZLSA-2017-1481)
packetstorm via4
data source https://packetstormsecurity.com/files/download/145391/QSA-20171211.txt
id PACKETSTORM:145391
last seen 2017-12-13
published 2017-12-13
reporter Qualys Security Advisory
source https://packetstormsecurity.com/files/145391/Qualys-Security-Advisory-GNU-C-Library-Memory-Leak-Buffer-Overflow.html
title Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow
redhat via4
advisories
  • bugzilla
    id 1452543
    title CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment glibc is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480009
        • comment glibc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872006
      • AND
        • comment glibc-common is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480013
        • comment glibc-common is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872012
      • AND
        • comment glibc-devel is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480007
        • comment glibc-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872018
      • AND
        • comment glibc-headers is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480005
        • comment glibc-headers is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872010
      • AND
        • comment glibc-static is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480011
        • comment glibc-static is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872008
      • AND
        • comment glibc-utils is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480015
        • comment glibc-utils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872014
      • AND
        • comment nscd is earlier than 0:2.12-1.209.el6_9.2
          oval oval:com.redhat.rhsa:tst:20171480017
        • comment nscd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872016
    rhsa
    id RHSA-2017:1480
    released 2017-06-19
    severity Important
    title RHSA-2017:1480: glibc security update (Important)
  • bugzilla
    id 1452543
    title CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment glibc is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481009
        • comment glibc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872006
      • AND
        • comment glibc-common is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481011
        • comment glibc-common is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872012
      • AND
        • comment glibc-devel is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481013
        • comment glibc-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872018
      • AND
        • comment glibc-headers is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481007
        • comment glibc-headers is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872010
      • AND
        • comment glibc-static is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481017
        • comment glibc-static is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872008
      • AND
        • comment glibc-utils is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481005
        • comment glibc-utils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872014
      • AND
        • comment nscd is earlier than 0:2.17-157.el7_3.4
          oval oval:com.redhat.rhsa:tst:20171481015
        • comment nscd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100872016
    rhsa
    id RHSA-2017:1481
    released 2017-06-19
    severity Important
    title RHSA-2017:1481: glibc security update (Important)
  • rhsa
    id RHSA-2017:1479
  • rhsa
    id RHSA-2017:1567
  • rhsa
    id RHSA-2017:1712
rpms
  • glibc-0:2.12-1.209.el6_9.2
  • glibc-common-0:2.12-1.209.el6_9.2
  • glibc-devel-0:2.12-1.209.el6_9.2
  • glibc-headers-0:2.12-1.209.el6_9.2
  • glibc-static-0:2.12-1.209.el6_9.2
  • glibc-utils-0:2.12-1.209.el6_9.2
  • nscd-0:2.12-1.209.el6_9.2
  • glibc-0:2.17-157.el7_3.4
  • glibc-common-0:2.17-157.el7_3.4
  • glibc-devel-0:2.17-157.el7_3.4
  • glibc-headers-0:2.17-157.el7_3.4
  • glibc-static-0:2.17-157.el7_3.4
  • glibc-utils-0:2.17-157.el7_3.4
  • nscd-0:2.17-157.el7_3.4
refmap via4
bid 99127
confirm
debian DSA-3887
gentoo GLSA-201706-19
misc https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
sectrack 1038712
Last major update 19-06-2017 - 12:29
Published 19-06-2017 - 12:29
Last modified 04-01-2018 - 21:31
Back to Top