Vulnerability Details : CVE-2017-15804
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
Vulnerability category: Overflow
Products affected by CVE-2017-15804
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-15804
0.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-15804
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-15804
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-15804
-
https://access.redhat.com/errata/RHSA-2018:1879
RHSA-2018:1879 - Security Advisory - Red Hat Customer Portal
-
https://sourceware.org/bugzilla/show_bug.cgi?id=22332
22332 – (CVE-2017-15804) Buffer overflow in glob with GLOB_TILDE in unescaping (CVE-2017-15804)Issue Tracking;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/101535
GNU glibc CVE-2017-15804 Heap Buffer Overflow Vulnerability
-
https://access.redhat.com/errata/RHSA-2018:0805
-
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8
sourceware.org Git - glibc.git/commitIssue Tracking;Patch;Third Party Advisory
Jump to