Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0170

7 documents6 sources
Severity
2.1LOW
EPSS
0.6%
top 29.47%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 26
Latest updateApr 30

Description

glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.

CVSS vector

AV:L/AC:L/C:P/I:N/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

NVDredhat/linux7.0
NVDconectiva/linux9 versions+8
NVDimmunix/immunix7.0_beta

Also affects: Debian Linux 2.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6558-8g43-2f27: glibc 22022-04-30
CVEList
CVE-2001-0170: glibc 22001-05-07

💥Exploits & PoCs

2
Exploit-DB
glibc-2.2 / openssh-2.3.0p1 / glibc 2.1.9x - File Read2001-01-25
Exploit-DB
Resolv+ 'RESOLV_HOST_CONF' - Linux Library Command Execution1996-01-01

📋Vendor Advisories

1
Red Hat
security flaw2001-01-10

💬Community

1
Bugzilla
CVE-2001-0170 security flaw2018-08-16
CVE-2001-0170 (LOW CVSS 2.1) | glibc 2.1.9x and earlier does not p | cvebase.io