CVE-2018-1000001
HIGH EXPLOITEDGNU Glibc < 2.26 - Out-of-Bounds Write
Title source: ruleDescription
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44889
nomisec
WORKING POC
by usernameid0 · remote
https://github.com/usernameid0/tools-for-CVE-2018-1000001
metasploit
WORKING POC
NORMAL
by halfdog, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_realpath_priv_esc.rb
References (10)
Scores
CVSS v3
7.8
EPSS
0.4142
EPSS Percentile
97.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2022-01-26
CWE
CWE-787
Status
published
Products (12)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
17.10
gnu/glibc
< 2.26
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_server_aus
7.6
redhat/enterprise_linux_server_eus
7.6
redhat/enterprise_linux_server_tus
7.6
... and 2 more
Published
Jan 31, 2018
Tracked Since
Feb 18, 2026