CVE-2018-11237

Current Description

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

Basic Data

PublishedMay 18, 2018
Last ModifiedJuly 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.6
SeverityMEDIUM
Exploitability Score3.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score7.8
CVSS 3 - Base SeverityHIGH
Exploitability Score1.8
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGlibc********2.27
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOracleCommunications Session Boarder Controller8.0.0*******
    2.3ApplicationOracleCommunications Session Boarder Controller8.1.0*******
    2.3ApplicationOracleCommunications Session Boarder Controller8.2.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.0.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.1.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationNetappData Ontap Edge-*******
    2.3ApplicationNetappElement Software Management-*******

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Oracle Communications Session Boarder Controller 8.0.0, 8.1.0, 8.2.0
Oracle Enterprise Communications Broker 3.0.0, 3.1.0
Netapp Data Ontap Edge -
Netapp Element Software Management -
Gnu Glibc *

References

NameSourceURLTags
104256http://www.securityfocus.com/bid/104256BIDThird Party Advisory VDB Entry
RHBA-2019:0327https://access.redhat.com/errata/RHBA-2019:0327REDHATThird Party Advisory
RHSA-2018:3092https://access.redhat.com/errata/RHSA-2018:3092REDHATThird Party Advisory
https://security.netapp.com/advisory/ntap-20190329-0001/https://security.netapp.com/advisory/ntap-20190329-0001/CONFIRMBroken Link
https://security.netapp.com/advisory/ntap-20190401-0001/https://security.netapp.com/advisory/ntap-20190401-0001/CONFIRMThird Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=23196https://sourceware.org/bugzilla/show_bug.cgi?id=23196MISCIssue Tracking Patch Third Party Advisory
USN-4416-1https://usn.ubuntu.com/4416-1/UBUNTU
44750https://www.exploit-db.com/exploits/44750/EXPLOIT-DBBroken Link Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlMISCPatch Third Party Advisory