[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2021-1511 --- glibc

ID: oval:org.secpod.oval:def:1601448Date: (C)2021-07-26   (M)2024-04-26
Class: PATCHFamily: unix




A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory , thus lowering the amount of memory being used with address space layout randomization . The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable. A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability. A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability. A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability

Platform:
Amazon Linux AMI
Product:
glibc
Reference:
ALAS-2021-1511
CVE-2019-19126
CVE-2019-25013
CVE-2020-10029
CVE-2020-29573
CVE    4
CVE-2019-19126
CVE-2020-10029
CVE-2019-25013
CVE-2020-29573
...

© SecPod Technologies