Page 5 of 42 results (0.016 seconds)

CVSS: 9.3EPSS: 0%CPEs: 10EXPL: 1

03 Apr 2017 — elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently ve... • https://github.com/Xiami2012/CVE-2017-16997-poc • CWE-426: Untrusted Search Path CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

20 Mar 2017 — The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing. La función pop_fail_stack en GNU C Library (también conocida como glibc o libc6) permite a atacantes dependientes de contexto provocar una denegación de servicio (fallo de aserción y caída de aplicación) a través de vectores relacionados con el procesamiento extendido de e... • http://www.openwall.com/lists/oss-security/2017/02/14/9 • CWE-19: Data Processing Errors •