First published: Tue Feb 26 2019(Updated: )
GNU glibc is vulnerable to a heap-based buffer overflow, caused by a buffer over-read flaw in the proceed_next_node function in posix/regexec.c. By sending a specially-crafted argument using a case-insensitive regular-expression match, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.29 | |
Netapp Cloud Backup | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Steelstore Cloud Integrated Storage | ||
McAfee Web Gateway | >=7.7.2.0<7.7.2.21 | |
McAfee Web Gateway | >=7.8.2.0<7.8.2.8 | |
McAfee Web Gateway | >=8.0.0<8.1.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
IBM Security Verify Access | <=10.0.0 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9169 is a vulnerability in the GNU C Library that allows a remote attacker to execute arbitrary code by exploiting a heap-based buffer overflow.
The severity of CVE-2019-9169 is critical, with a CVSS score of 9.8.
The affected software products include IBM Security Verify Access, GNU glibc, Netapp Cloud Backup, NetApp ONTAP Select Deploy administration utility, Netapp Steelstore Cloud Integrated Storage, and McAfee Web Gateway.
To fix the CVE-2019-9169 vulnerability, apply the appropriate security patches provided by the vendor. For GNU glibc, update to version 2.31-13+deb11u7 or 2.37-12.
For more information about CVE-2019-9169, you can visit the CVE Mitre website, the Ubuntu Security Notices page, or the NIST National Vulnerability Database.