Vulnerabilities > CVE-2020-1751 - Out-of-bounds Write vulnerability in multiple products
Attack vector
LOCAL Attack complexity
HIGH Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2020-0832-1.NASL description This update for glibc fixes the following issues : CVE-2020-1752: Fixed a use after free in glob which could have allowed a local attacker to create a specially crafted path that, when processed by the glob function, could potentially have led to arbitrary code execution (bsc#1167631). CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC (bsc#1158996). CVE-2020-10029: Fixed a stack-based buffer overflow during range reduction (bsc#1165784). Use last seen 2020-05-08 modified 2020-04-02 plugin id 135165 published 2020-04-02 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135165 title SUSE SLES12 Security Update : glibc (SUSE-SU-2020:0832-1) NASL family Fedora Local Security Checks NASL id FEDORA_2020-244EFC27AF.NASL description This update incorporates fixes from the upstream glibc 2.30 stable release branch, including 3 fixes for medium severity security vulnerabilities. (CVE-2020-10029, CVE-2020-1752, CVE-2020-1751) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-08 modified 2020-04-06 plugin id 135209 published 2020-04-06 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135209 title Fedora 31 : glibc (2020-244efc27af) NASL family Fedora Local Security Checks NASL id FEDORA_2020-7F625C5EA8.NASL description This update incorporates fixes from the upstream glibc 2.29 stable release branch, including 3 fixes for medium severity security vulnerabilities. (CVE-2020-10029, CVE-2020-1752, CVE-2020-1751) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-08 modified 2020-04-10 plugin id 135372 published 2020-04-10 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/135372 title Fedora 30 : glibc (2020-7f625c5ea8) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2020-1579.NASL description According to the version of the glibc packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - When unwinding through a signal frame the backtrace function on PowerPC didn last seen 2020-05-31 modified 2020-05-26 plugin id 136857 published 2020-05-26 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136857 title EulerOS 2.0 SP8 : glibc (EulerOS-SA-2020-1579)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://security.gentoo.org/glsa/202006-04
- https://security.gentoo.org/glsa/202006-04
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://usn.ubuntu.com/4416-1/
- https://usn.ubuntu.com/4416-1/