Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871862
Category:Red Hat Local Security Checks
Title:RedHat Update for glibc RHSA-2017:1916-01
Summary:The remote host is missing an update for the 'glibc'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'glibc'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The glibc packages provide the standard C
libraries (libc), POSIX thread libraries (libpthread), standard math libraries
(libm), and the name service cache daemon (nscd) used by multiple programs on
the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es): * A stack overflow vulnerability was found in nan* functions
that could cause applications, which process long strings with the nan function,
to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found
that out-of-range time values passed to the strftime() function could result in
an out-of-bounds memory access. This could lead to application crash or,
potentially, information disclosure. (CVE-2015-8776) * An integer overflow
vulnerability was found in hcreate() and hcreate_r() functions which could
result in an out-of-bounds memory access. This could lead to application crash
or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based
buffer overflow vulnerability was found in the catopen() function. An
excessively long string passed to the function could cause it to crash or,
potentially, execute arbitrary code. (CVE-2015-8779) * It was found that the
dynamic loader did not sanitize the LD_POINTER_GUARD environment variable. An
attacker could use this flaw to bypass the pointer guarding protection on
set-user-ID or set-group-ID programs to execute arbitrary code with the
permissions of the user running the application. (CVE-2015-8777) Additional
Changes: For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.4 Release Notes linked from the References section.

Affected Software/OS:
glibc on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9761
BugTraq ID: 83306
http://www.securityfocus.com/bid/83306
Bugtraq: 20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series (Google Search)
https://seclists.org/bugtraq/2019/Jun/14
Bugtraq: 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X (Google Search)
https://seclists.org/bugtraq/2019/Sep/7
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
RedHat Security Advisories: RHSA-2017:0680
http://rhn.redhat.com/errata/RHSA-2017-0680.html
RedHat Security Advisories: RHSA-2017:1916
https://access.redhat.com/errata/RHSA-2017:1916
SuSE Security Announcement: SUSE-SU-2016:0470 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
SuSE Security Announcement: SUSE-SU-2016:0471 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
SuSE Security Announcement: SUSE-SU-2016:0472 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
SuSE Security Announcement: SUSE-SU-2016:0473 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
SuSE Security Announcement: openSUSE-SU-2016:0510 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
Common Vulnerability Exposure (CVE) ID: CVE-2015-8776
BugTraq ID: 83277
http://www.securityfocus.com/bid/83277
Debian Security Information: DSA-3480 (Google Search)
http://www.debian.org/security/2016/dsa-3480
Debian Security Information: DSA-3481 (Google Search)
http://www.debian.org/security/2016/dsa-3481
https://security.gentoo.org/glsa/201602-02
Common Vulnerability Exposure (CVE) ID: CVE-2015-8777
BugTraq ID: 81469
http://www.securityfocus.com/bid/81469
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
http://www.securitytracker.com/id/1034811
Common Vulnerability Exposure (CVE) ID: CVE-2015-8778
BugTraq ID: 83275
http://www.securityfocus.com/bid/83275
Common Vulnerability Exposure (CVE) ID: CVE-2015-8779
BugTraq ID: 82244
http://www.securityfocus.com/bid/82244
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.