GNU C Library におけるバッファエラーの脆弱性
| Title |
GNU C Library におけるバッファエラーの脆弱性
|
| Summary |
GNU C Library (別名 glibc または libc6) には、バッファエラーの脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Dec. 25, 2017, midnight |
| Registration Date |
July 6, 2018, 6:42 p.m. |
| Last Update |
July 6, 2018, 6:42 p.m. |
|
CVSS3.0 : 緊急
|
| Score |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
Affected System
| GNU Project |
|
GNU C Library 2.21 から 2.27
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年07月06日] 掲載 |
July 6, 2018, 6:42 p.m. |
NVD Vulnerability Information
CVE-2017-18269
| Summary |
An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
|
| Publication Date |
May 19, 2018, 1:29 a.m. |
| Registration Date |
Jan. 26, 2021, 1:20 p.m. |
| Last Update |
Nov. 21, 2024, 12:19 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* |
2.21 |
2.27 |
|
|
| execution environment |
| 1 |
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List