Integer overflow in Glibc - CVE-2017-17426

 

Integer overflow in Glibc - CVE-2017-17426

Published: December 5, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU37856
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-17426
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: GNU
Affected software:
Glibc

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.


How to mitigate CVE-2017-17426

Install update from vendor's website.

Sources