CVE-2018-1000001

HIGH EXPLOITED

GNU Glibc < 2.26 - Out-of-Bounds Write

Title source: rule

Description

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

Exploits (7)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44889
exploitdb WORKING POC VERIFIED
by halfdog · clocallinux
https://www.exploit-db.com/exploits/43775
nomisec WORKING POC 32 stars
by 0x00-0x00 · local
https://github.com/0x00-0x00/CVE-2018-1000001
nomisec WORKING POC
by usernameid0 · remote
https://github.com/usernameid0/tools-for-CVE-2018-1000001
vulncheck_xdb WORKING POC
local
https://github.com/5H311-1NJ3C706/local-root-exploits
metasploit WORKING POC NORMAL
by halfdog, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_realpath_priv_esc.rb

Scores

CVSS v3 7.8
EPSS 0.4142
EPSS Percentile 97.4%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2022-01-26
CWE
CWE-787
Status published
Products (12)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
gnu/glibc < 2.26
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server_aus 7.6
redhat/enterprise_linux_server_eus 7.6
redhat/enterprise_linux_server_tus 7.6
... and 2 more
Published Jan 31, 2018
Tracked Since Feb 18, 2026