Vulnerability Details : CVE-2017-12133
Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
Vulnerability category: Memory Corruption
Products affected by CVE-2017-12133
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-12133
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-12133
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2017-12133
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-12133
-
https://sourceware.org/bugzilla/show_bug.cgi?id=21115
21115 – (CVE-2017-12133) sunrpc: Use-after-free in error path in clntudp_call (CVE-2017-12133)Issue Tracking;Third Party Advisory
-
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491
sourceware.org Git - glibc.git/commitMailing List;Third Party Advisory
-
https://usn.ubuntu.com/4416-1/
USN-4416-1: GNU C Library vulnerabilities | Ubuntu security notices | Ubuntu
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/
[SECURITY] Fedora 25 Update: glibc-2.24-10.fc25 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://www.securityfocus.com/bid/100679
GNU glibc CVE-2017-12133 Use After Free Information Disclosure Vulnerability
Jump to