Vulnerability Name: | CVE-2019-1010023 (CCN-163701) | ||||||||||||||||||||
Assigned: | 2018-09-02 | ||||||||||||||||||||
Published: | 2018-09-02 | ||||||||||||||||||||
Updated: | 2020-11-16 | ||||||||||||||||||||
Summary: | ** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. Note: Upstream comments indicate "this is being treated as a non-security bug and no real threat." | ||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 8.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-1010023 Source: BID Type: Third Party Advisory, VDB Entry 109167 Source: XF Type: UNKNOWN gnulibc-cve20191010023-priv-esc(163701) Source: DEBIAN Type: UNKNOWN CVE-2019-1010023 Source: CCN Type: Sourceware Bugzilla - Bug 22851 ld library ELF load error Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://sourceware.org/bugzilla/show_bug.cgi?id=22851 Source: CONFIRM Type: UNKNOWN https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS Source: UBUNTU Type: UNKNOWN CVE-2019-1010023 Source: CCN Type: GNU Web site The GNU C Library (glibc) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |