CVE-2018-6551Integer Overflow or Wraparound in Glibc

Severity
9.8CRITICALNVD
EPSS
0.4%
top 38.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 2
Latest updateMay 13

Description

The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debiangnu/glibc< 2.27-1+3
NVDgnu/glibc2.242.26

🔴Vulnerability Details

3
GHSA
GHSA-39wv-6252-46w2: The malloc implementation in the GNU C Library (aka glibc or libc6), from version 22022-05-13
CVEList
CVE-2018-6551: The malloc implementation in the GNU C Library (aka glibc or libc6), from version 22018-02-02
OSV
CVE-2018-6551: The malloc implementation in the GNU C Library (aka glibc or libc6), from version 22018-02-02

📋Vendor Advisories

2
Red Hat
glibc: integer overflow in malloc functions2018-02-02
Debian
CVE-2018-6551: glibc - The malloc implementation in the GNU C Library (aka glibc or libc6), from versio...2018

💬Community

1
Bugzilla
CVE-2018-6551 glibc: integer overflow in malloc functions2018-02-05
CVE-2018-6551 — Integer Overflow or Wraparound in Glibc | cvebase