#VU11787 Use-after-free error in Glibc - CVE-2017-12133
Published: April 12, 2018
Vulnerability identifier: #VU11787
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-12133
CWE-ID: CWE-416
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Glibc
Glibc
Software vendor:
GNU
GNU
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in the DNS stub resolver due to it will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attackers due to IP fragmentation when enabling EDNS support. A remote attacker can trigger use after free and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the DNS stub resolver due to it will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attackers due to IP fragmentation when enabling EDNS support. A remote attacker can trigger use after free and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Update to version 2.26.