SB2018040501 - Gentoo update for glibc



SB2018040501 - Gentoo update for glibc

Published: April 5, 2018

Security Bulletin ID SB2018040501
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 38% Low 63%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2017-14062)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4. A remote attacker can cause a denial of service or possibly have unspecified other impact.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Memory corruption (CVE-ID: CVE-2017-15670)

The vulnerability allows a remote attacker to execute arbitrary code with elevated privileges on the target system.

The weakness exists in the glob function in glob.c due to off-by-one error. A remote attacker can trigger heap-based buffer overflow and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

3) Memory leak (CVE-ID: CVE-2017-15671)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the glob function in glob.c due to it skips freeing allocated memory when processing the ~ operator with a long user name when invoked with GLOB_TILDE. A remote attacker can trigger memory corruption and cause the service to crash.

4) Buffer overflow (CVE-ID: CVE-2017-15804)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the glob function in glob.c due to buffer overflow during unescaping of user names with the ~ operator. A remote attacker can trigger memory corruption and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.


5) Insecure DLL loading (CVE-ID: CVE-2017-16997)

The vulnerability allows a local attacker to compromise vulnerable system.

The weakness exists in elf/dl-load.c due to insecure .dll loading mechanism when opening files. Alocal attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share and execute arbitrary code on the target system with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


6) Privilege escalation (CVE-ID: CVE-2018-1000001)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in due to a change in the processing of pathnames in the getcwd() command introduced in Linux kernel. A local attacker can use a specially crafted application, trigger buffer underflow in the __realpath() function in 'stdlib/canonicalize.c' and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

7) Integer overflow (CVE-ID: CVE-2018-6485)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists in the implementation of the posix_memalign in memalign functions due to integer overflow when causing these functions to return a pointer to a heap area that is too small. A remote attacker can trigger memory corruption and gain root privileges.

8) Integer overflow (CVE-ID: CVE-2018-6551)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists in the malloc implementation due to improper handling of malloc calls with arguments close to SIZE_MAX and returning a pointer to a heap region that is smaller than requested. A remote attacker can gain root privileges.

Remediation

Install update from vendor's website.