Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-1000001 — Out-of-bounds Write in Glibc
Severity
7.8HIGHNVD
OSV9.8
EPSS
41.4%
top 2.59%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 31
Latest updateMay 13
Description
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages9 packages
Also affects: Ubuntu Linux 12.04, 14.04, 16.04, 17.10, Enterprise Linux 7.6
🔴Vulnerability Details
6💥Exploits & PoCs
2📋Vendor Advisories
5💬Community
3Bugzilla▶
CVE-2018-1000001 glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation [fedora-all]↗2018-01-12
Bugzilla▶
CVE-2018-1000001 glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation↗2018-01-12
Bugzilla▶
CVE-2018-1000001 glibc-arm-linux-gnu: glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation [fedora-all]↗2018-01-12