First published: Thu Feb 01 2018(Updated: )
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 | |
GNU C Library | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000409 is a buffer overflow vulnerability in glibc 2.5 that can be triggered through the LD_LIBRARY_PATH environment variable.
The vulnerability can be exploited by a malformed LD_LIBRARY_PATH environment variable that leads to a buffer overflow, potentially allowing an attacker to execute arbitrary code.
Yes, glibc version 2.23-0ubuntu10 is affected by CVE-2017-1000409.
To fix CVE-2017-1000409 on Ubuntu, update glibc to version 2.23-0ubuntu10 or higher.
More information about CVE-2017-1000409 can be found at the following references: [Reference 1](http://seclists.org/oss-sec/2017/q4/385), [Reference 2](https://security.netapp.com/advisory/ntap-20190404-0003/), [Reference 3](https://www.exploit-db.com/exploits/43331/).