#VU13011 Memory corruption in Glibc - CVE-2018-11236
Published: May 24, 2018 / Updated: July 20, 2018
Glibc
GNU
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists in the stdlib/canonicalize.c source code in the GNU glibc library due to improper processing of long pathname arguments to the realpath function. A local unauthenticated attacker can send long pathname arguments to a targeted system that is using 32-bit architecture, trigger an integer overflow condition that can lead to stack-based buffer overflow condition and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.