2.1
CVSSv2

CVE-2015-8777

Published: 20/01/2016 Updated: 05/01/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) prior to 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc

Vendor Advisories

Several security issues were fixed in the GNU C Library ...
USN-2985-1 introduced a regression in the GNU C Library ...
Unbounded stack allocation in catopen functionA stack based buffer overflow vulnerability was found in the catopen() function An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code(CVE-2015-8779) Integer overflow in hcreate and hcreate_rAn integer overflow vulnerability was found in hcrea ...