Use-After-Free Vulnerability in glibc Affecting Directory Path Handling
CVE-2020-1752
7HIGH
Summary
A use-after-free vulnerability was identified in glibc, specifically linked to the handling of directory paths containing an initial tilde followed by a valid username. A local attacker could exploit this issue by crafting a malicious path that, when processed by the glob function, may lead to arbitrary code execution. This vulnerability affects glibc versions prior to 2.32 and highlights the importance of keeping libraries up-to-date to mitigate such security risks.
Affected Version(s)
glibc Affected: versions 2.14 and later
glibc Fixed: version 2.32
References
CVSS V3.1
Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved