GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
BID:104255
CVE-2018-11236 |Info
GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
| Bugtraq ID: | 104255 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2018-11236 |
| Remote: | Yes |
| Local: | No |
| Published: | May 18 2018 12:00AM |
| Updated: | Apr 17 2019 05:00AM |
| Credit: | The vendor reported this issue. |
| Vulnerable: |
Oracle Enterprise Session Border Controller 8.2 Oracle Enterprise Session Border Controller 8.1 Oracle Enterprise Session Border Controller 8.0 Oracle Enterprise Communications Broker 3.1 Oracle Enterprise Communications Broker 3.0 Oracle Communications Session Border Controller 8.2 Oracle Communications Session Border Controller 8.1 Oracle Communications Session Border Controller 8.0 GNU glibc 2.22.90 GNU glibc 2.12.2 GNU glibc 2.12.1 GNU glibc 2.11.2 GNU glibc 2.11.1 GNU glibc 2.10.1 GNU glibc 2.5 GNU glibc 2.3.10 GNU glibc 2.3.4 GNU glibc 2.3.3 GNU glibc 2.3.2 GNU glibc 2.3.1 GNU glibc 2.3 GNU glibc 2.2.5 GNU glibc 2.2.4 GNU glibc 2.2.3 GNU glibc 2.2.2 GNU glibc 2.2.1 GNU glibc 2.2 GNU glibc 2.1.9 GNU glibc 2.1.3 GNU glibc 2.1.2 GNU glibc 2.1.1 GNU glibc 2.1 GNU glibc 2.0.6 GNU glibc 2.0.5 GNU glibc 2.0.4 GNU glibc 2.0.3 GNU glibc 2.0.2 GNU glibc 2.0.1 GNU glibc 2.0 GNU glibc 2.9 GNU glibc 2.8 GNU glibc 2.7 GNU glibc 2.6.1 GNU glibc 2.6 GNU glibc 2.5.1 GNU glibc 2.4 GNU glibc 2.3.6 GNU glibc 2.3.5 GNU glibc 2.26 GNU glibc 2.25 GNU glibc 2.24 GNU glibc 2.23 GNU glibc 2.22 GNU glibc 2.21 GNU glibc 2.20 GNU glibc 2.19 GNU glibc 2.18 GNU glibc 2.17 GNU glibc 2.16 GNU glibc 2.15 GNU glibc 2.14.1 GNU glibc 2.14 GNU glibc 2.13 GNU glibc 2.12 GNU glibc 2.11.3 GNU glibc 2.11 GNU glibc 2.10 GNU glibc 2.1.3.10 GNU Cfengine 1.2.3 |
| Not Vulnerable: |
GNU glibc 2.27 |
Discussion
GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
GNU glibc is prone to a stack-based buffer-overflow vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploits will result in denial-of-service condition.
Versions prior to glibc 2.27 are vulnerable.
GNU glibc is prone to a stack-based buffer-overflow vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploits will result in denial-of-service condition.
Versions prior to glibc 2.27 are vulnerable.
Exploit / POC
GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
References
GNU glibc CVE-2018-11236 Stack Buffer Overflow Vulnerability
References:
References: