Search for vulnerabilities
Vulnerability details: VCID-4xqz-mqku-aaad
Vulnerability ID VCID-4xqz-mqku-aaad
Aliases CVE-2017-1000366
Summary glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000366.html
rhas Important https://access.redhat.com/errata/RHSA-2017:1479
rhas Important https://access.redhat.com/errata/RHSA-2017:1480
rhas Important https://access.redhat.com/errata/RHSA-2017:1481
cvssv3 7.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00070 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00070 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00070 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.00070 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.04628 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06565 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06733 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06733 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06733 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.06733 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.07832 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.07832 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.07832 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.07832 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.07832 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0808 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08282 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.08656 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0887 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.0887 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.10404 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.10404 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.10404 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.11149 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
epss 0.11149 https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1452543
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
cvssv2 6.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.2 https://nvd.nist.gov/vuln/detail/CVE-2017-1000366
cvssv3 7.8 https://nvd.nist.gov/vuln/detail/CVE-2017-1000366
archlinux High https://security.archlinux.org/AVG-307
archlinux High https://security.archlinux.org/AVG-308
generic_textual Medium https://ubuntu.com/security/notices/USN-3323-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3323-2
generic_textual High https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Reference id Reference type URL
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000366.html
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json
https://access.redhat.com/security/cve/CVE-2017-1000366
https://api.first.org/data/v1/epss?cve=CVE-2017-1000366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
http://seclists.org/fulldisclosure/2019/Sep/7
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201706-19
https://ubuntu.com/security/notices/USN-3323-1
https://ubuntu.com/security/notices/USN-3323-2
https://www.exploit-db.com/exploits/42274/
https://www.exploit-db.com/exploits/42275/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000366/
https://www.suse.com/support/kb/doc/?id=7020973
http://www.debian.org/security/2017/dsa-3887
http://www.securityfocus.com/bid/99127
http://www.securitytracker.com/id/1038712
1452543 https://bugzilla.redhat.com/show_bug.cgi?id=1452543
ASA-201706-22 https://security.archlinux.org/ASA-201706-22
ASA-201706-23 https://security.archlinux.org/ASA-201706-23
AVG-307 https://security.archlinux.org/AVG-307
AVG-308 https://security.archlinux.org/AVG-308
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*
CVE-2017-1000366 https://nvd.nist.gov/vuln/detail/CVE-2017-1000366
CVE-2017-1000370;CVE-2017-1000366 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c
CVE-2017-1000370;CVE-2017-1000366 Exploit https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
CVE-2017-1000371;CVE-2017-1000366 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c
CVE-2017-1000371;CVE-2017-1000366 Exploit https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
CVE-2017-1000379;CVE-2017-1000366 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c
CVE-2017-1000379;CVE-2017-1000366 Exploit https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
RHSA-2017:1479 https://access.redhat.com/errata/RHSA-2017:1479
RHSA-2017:1480 https://access.redhat.com/errata/RHSA-2017:1480
RHSA-2017:1481 https://access.redhat.com/errata/RHSA-2017:1481
USN-3323-1 https://usn.ubuntu.com/3323-1/
USN-3323-2 https://usn.ubuntu.com/3323-2/
Data source Exploit-DB
Date added June 28, 2017
Description Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/25 / CentOS 7.3.1611) - 'ldso_hwcap_64 Stack Clash' Local Privilege Escalation
Ransomware campaign use Known
Source publication date June 28, 2017
Exploit type local
Platform linux_x86-64
Source update date July 19, 2017
Source URL https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000366
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000366
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.27966
EPSS Score 0.00063
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.