Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Red Hat has released updates for glibc multiple vulnerabilities that cause privilege escalation and unauthorized system access.
IMPACT: CRITICAL
PUBLISH DATE: 05-11-2018
OVERVIEW
Red Hat has issued an update for glibc for fixing multiple vulnerabilities. These can be exploited by malicious, local users to acquire privilege escalation and by malicious people to compromise a vulnerable system.
ANALYSIS
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. If the glibc packages are compromised, the Linux system cannot function correctly without the above-mentioned libraries.
The security updates include following fixes for the given vulnerabilities.
CVE-2017-16997
glibc: This CVE number is allotted to an incorrect handling of RPATH in elf/dl-load.c, which can be used to execute code, loaded from arbitrary libraries.
CVE-2018-6485
glibc: This vulnerability results from an Integer overflow in posix_memalign in memalign functions.
CVE-2018-11236
glibc: This issue is caused by an Integer overflow in stdlib/canonicalize.c on 32-bit architectures. It leads to stack-based buffer overflow.
CVE-2018-11237
glibc: This problem arises from a Buffer overflow in __mempcpy_avx512_no_vzeroupper.
AFFECTED PRODUCTS
Red Hat Virtualization 4.x Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7
UPDATES
Red Hat Network provides the updated packages via the following links.
https://access.redhat.com/errata/RHSA-2018:3092
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com for a quick response.