CVE Vulnerabilities

CVE-2019-1010023

Published: Jul 15, 2019 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.8 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate this is being treated as a non-security bug and no real threat.

Affected Software

NameVendorStart VersionEnd Version
GlibcGnu- (including)- (including)
EglibcUbuntuesm-infra-legacy/trusty*
EglibcUbuntuprecise/esm*
EglibcUbuntutrusty*
EglibcUbuntutrusty/esm*
GlibcUbuntubionic*
GlibcUbuntucosmic*
GlibcUbuntudevel*
GlibcUbuntudisco*
GlibcUbuntueoan*
GlibcUbuntuesm-infra/bionic*
GlibcUbuntuesm-infra/focal*
GlibcUbuntuesm-infra/xenial*
GlibcUbuntufocal*
GlibcUbuntuxenial*

References