CVE-2018-11237
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
18/05/2018
Last modified:
13/09/2022
Description
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | 2.27 (including) | |
| cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/104256
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2018:3092
- https://security.netapp.com/advisory/ntap-20190329-0001/
- https://security.netapp.com/advisory/ntap-20190401-0001/
- https://sourceware.org/bugzilla/show_bug.cgi?id=23196
- https://usn.ubuntu.com/4416-1/
- https://www.exploit-db.com/exploits/44750/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html



