First published: Mon Jun 19 2017(Updated: )
libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. It was previously stated that this affects libffi version 3.2.1 but this appears to be incorrect. libffi prior to version 3.1 on 32 bit x86 systems was vulnerable, and upstream is believed to have fixed this issue in version 3.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization | ||
Red Hat OpenShift | =2.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian Libffi | <3.2 | |
Oracle PeopleTools | =8.56 | |
Oracle PeopleTools | =8.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000376 is considered a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2017-1000376, you should apply the latest security patches for libffi and the affected software.
CVE-2017-1000376 affects libffi and various applications using it, including Red Hat Enterprise Linux and Oracle PeopleTools.
CVE-2017-1000376 is a vulnerability in libffi that allows for an executable stack, increasing the risk of exploiting arbitrary code execution.
Immediate action should be taken to upgrade or patch software affected by CVE-2017-1000376 to mitigate security risks.