Vulnerabilities > CVE-2007-3508 - Numeric Errors vulnerability in Gentoo Glibc 2.5
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the process_envvars function in elf/rtld.c in glibc before 2.5-rc4 might allow local users to execute arbitrary code via a large LD_HWCAP_MASK environment variable value. NOTE: the glibc maintainers state that they do not believe that this issue is exploitable for code execution
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200707-04.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200707-04 (GNU C Library: Integer overflow) Tavis Ormandy of the Gentoo Linux Security Team discovered a flaw in the handling of the hardware capabilities mask by the dynamic loader. If a mask is specified with a high population count, an integer overflow could occur when allocating memory. Impact : As the hardware capabilities mask is honored by the dynamic loader during the execution of suid and sgid programs, in theory this vulnerability could result in the execution of arbitrary code with root privileges. This update is provided as a precaution against currently unknown attack vectors. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25665 |
published | 2007-07-04 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25665 |
title | GLSA-200707-04 : GNU C Library: Integer overflow |
code |
|
Statements
contributor Vincent Danen lastmodified 2007-09-17 organization Mandriva statement Based on the analysis of Red Hat and several Glibc developers, Mandriva does not believe this to be exploitable. contributor Joshua Bressers lastmodified 2007-07-05 organization Red Hat statement After careful analysis by Red Hat and several Glibc developers, it has been determined that this bug is not exploitable. For more information please see Red Hat Bugzilla bug #247208 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=247208
References
- http://bugs.gentoo.org/show_bug.cgi?id=183844
- http://bugs.gentoo.org/show_bug.cgi?id=183844
- http://osvdb.org/37901
- http://osvdb.org/37901
- http://secunia.com/advisories/25864
- http://secunia.com/advisories/25864
- http://security.gentoo.org/glsa/glsa-200707-04.xml
- http://security.gentoo.org/glsa/glsa-200707-04.xml
- http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup
- http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup
- http://www.securityfocus.com/bid/24758
- http://www.securityfocus.com/bid/24758
- http://www.securitytracker.com/id?1018334
- http://www.securitytracker.com/id?1018334
- http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html
- http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html
- http://www.vupen.com/english/advisories/2007/2418
- http://www.vupen.com/english/advisories/2007/2418
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35240
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35240