CVE-2018-6485

Current Description

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.

Basic Data

PublishedFebruary 01, 2018
Last ModifiedJuly 09, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-190
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredNONE
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score9.8
CVSS 3 - Base SeverityCRITICAL
Exploitability Score3.9
Base SeverityCRITICAL

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGlibc********2.26
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOracleCommunications Session Border Controller8.0.0*******
    2.3ApplicationOracleCommunications Session Border Controller8.1.0*******
    2.3ApplicationOracleCommunications Session Border Controller8.2.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.0.0*******
    2.3ApplicationOracleEnterprise Communications Broker3.1.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationNetappCloud Backup-*******
    2.3ApplicationNetappData Ontap Edge-*******
    2.3ApplicationNetappElement Software-*******
    2.3ApplicationNetappElement Software Management-*******
    2.3ApplicationNetappSteelstore Cloud Integrated Storage-*******
    2.3ApplicationNetappStorage Replication Adapter********7.2
    2.3ApplicationNetappVasa Provider6.x****clustered_data_ontap**
    2.3ApplicationNetappVasa Provider*****clustered_data_ontap**7.2
    2.3ApplicationNetappVirtual Storage Console-*******
    2.3ApplicationNetappVirtual Storage Console*****vmware_vsphere**7.2

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Oracle Communications Session Border Controller 8.0.0, 8.1.0, 8.2.0
Oracle Enterprise Communications Broker 3.0.0, 3.1.0
Netapp Data Ontap Edge -
Netapp Virtual Storage Console *, -
Netapp Storage Replication Adapter *
Netapp Element Software -
Netapp Cloud Backup -
Netapp Element Software Management -
Netapp Vasa Provider *, 6.x
Netapp Steelstore Cloud Integrated Storage -
Gnu Glibc *

References

NameSourceURLTags
http://bugs.debian.org/878159http://bugs.debian.org/878159CONFIRMIssue Tracking Mailing List Third Party Advisory
102912http://www.securityfocus.com/bid/102912BIDThird Party Advisory VDB Entry
RHBA-2019:0327https://access.redhat.com/errata/RHBA-2019:0327REDHATThird Party Advisory
RHSA-2018:3092https://access.redhat.com/errata/RHSA-2018:3092REDHATPatch Third Party Advisory
https://security.netapp.com/advisory/ntap-20190404-0003/https://security.netapp.com/advisory/ntap-20190404-0003/CONFIRMThird Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=22343https://sourceware.org/bugzilla/show_bug.cgi?id=22343CONFIRMIssue Tracking Third Party Advisory
USN-4218-1https://usn.ubuntu.com/4218-1/UBUNTU
USN-4416-1https://usn.ubuntu.com/4416-1/UBUNTU
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlMISCPatch Third Party Advisory