Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
References
Link | Resource |
---|---|
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491 | Mailing List Third Party Advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=21115 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/ | Third Party Advisory |
https://www.securityfocus.com/bid/100679 | |
https://usn.ubuntu.com/4416-1/ |
Configurations
Information
Published : 2017-09-07 06:29
Updated : 2020-07-09 13:15
NVD link : CVE-2017-12133
Mitre link : CVE-2017-12133
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
gnu
- glibc