CVE-2018-11236

Current Description

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

Basic Data

PublishedMay 18, 2018
Last ModifiedJuly 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-190
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredNONE
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score9.8
CVSS 3 - Base SeverityCRITICAL
Exploitability Score3.9
Base SeverityCRITICAL

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGlibc********2.27
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOracleCommunications Session Border Controller8.0.0*******
    2.3ApplicationOracleCommunications Session Border Controller8.1.0*******
    2.3ApplicationOracleCommunications Session Border Controller8.2.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.0.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.1.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationNetappData Ontap Edge-*******
    2.3ApplicationNetappElement Software Management-*******

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Oracle Communications Session Border Controller 8.0.0, 8.1.0, 8.2.0
Oracle Enterprise Communications Broker 3.0.0, 3.1.0
Netapp Data Ontap Edge -
Netapp Element Software Management -
Gnu Glibc *

References

NameSourceURLTags
104255http://www.securityfocus.com/bid/104255BIDThird Party Advisory VDB Entry
RHBA-2019:0327https://access.redhat.com/errata/RHBA-2019:0327REDHATThird Party Advisory
RHSA-2018:3092https://access.redhat.com/errata/RHSA-2018:3092REDHATPatch Third Party Advisory
https://security.netapp.com/advisory/ntap-20190329-0001/https://security.netapp.com/advisory/ntap-20190329-0001/CONFIRMBroken Link
https://security.netapp.com/advisory/ntap-20190401-0001/https://security.netapp.com/advisory/ntap-20190401-0001/CONFIRMThird Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=22786https://sourceware.org/bugzilla/show_bug.cgi?id=22786MISCIssue Tracking Third Party Advisory
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2MISCPatch Release Notes Third Party Advisory
USN-4416-1https://usn.ubuntu.com/4416-1/UBUNTU
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlMISCPatch Third Party Advisory