Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0184
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0184)
Zusammenfassung:The remote host is missing an update for the 'glibc' package(s) announced via the MGASA-2017-0184 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the MGASA-2017-0184 advisory.

Vulnerability Insight:
The sunrpc implementation in glibc is vulnerable to a flaw that can cause
it to be triggered to allocate additional memory until it causes a crash,
similar to CVE-2017-8779 (CVE-2017-8804).

A flaw was found in the way memory was being allocated on the stack for
user space binaries. If heap (or different memory region) and stack memory
regions were adjacent to each other, an attacker could use this flaw to
jump over the stack guard gap, cause controlled memory corruption on
process stack or the adjacent memory region, and thus increase their
privileges on the system. This is glibc-side mitigation which blocks
processing of LD_LIBRARY_PATH for programs running in secure-execution
mode and reduces the number of allocations performed by the processing
of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation
of this issue more difficult (CVE-2017-1000366).

The CVE-2017-1000366 issue is part of a set of issues known as Stack Clash.
The fixes have components in both glibc and the kernel. The kernel fix will
be included in a separate update advisory (mga#21141)

Affected Software/OS:
'glibc' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000366
BugTraq ID: 99127
http://www.securityfocus.com/bid/99127
Bugtraq: 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X (Google Search)
https://seclists.org/bugtraq/2019/Sep/7
Debian Security Information: DSA-3887 (Google Search)
http://www.debian.org/security/2017/dsa-3887
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
http://seclists.org/fulldisclosure/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
RedHat Security Advisories: RHSA-2017:1479
https://access.redhat.com/errata/RHSA-2017:1479
RedHat Security Advisories: RHSA-2017:1480
https://access.redhat.com/errata/RHSA-2017:1480
RedHat Security Advisories: RHSA-2017:1481
https://access.redhat.com/errata/RHSA-2017:1481
RedHat Security Advisories: RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1567
RedHat Security Advisories: RHSA-2017:1712
https://access.redhat.com/errata/RHSA-2017:1712
http://www.securitytracker.com/id/1038712
Common Vulnerability Exposure (CVE) ID: CVE-2017-8804
BugTraq ID: 98339
http://www.securityfocus.com/bid/98339
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
SuSE Security Announcement: SUSE-SU-2018:0451 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
SuSE Security Announcement: SUSE-SU-2018:0565 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
SuSE Security Announcement: openSUSE-SU-2018:0494 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.