#VU13011 Memory corruption in Glibc - CVE-2018-11236

 

#VU13011 Memory corruption in Glibc - CVE-2018-11236

Published: May 24, 2018 / Updated: July 20, 2018


Vulnerability identifier: #VU13011
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-11236
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Glibc
Software vendor:
GNU

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in the stdlib/canonicalize.c source code in the GNU glibc library due to improper processing of long pathname arguments to the realpath function. A local unauthenticated attacker can send long pathname arguments to a targeted system that is using 32-bit architecture, trigger an integer overflow condition that can lead to stack-based buffer overflow condition and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links