RVD
RVD copied to clipboard
RVD#1455: A buffer overflow in glibc 2.5 which can be triggered through the LD_LIBRARY_PATH environment variable
{
"id": 1455,
"title": "RVD#1455: A buffer overflow in glibc 2.5 which can be triggered through the LD_LIBRARY_PATH environment variable",
"type": "vulnerability",
"description": "A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.",
"cwe": "CWE-119",
"cve": "CVE-2017-1000409",
"keywords": [
"LD_LIBRARY_PATH",
"glibc",
"Universal Robots"
],
"system": "URx",
"vendor": "Universal Robots",
"severity": {
"rvss-score": 9.6,
"rvss-vector": "RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/Y:T/S:U/C:H/I:H/A:H/H:U",
"severity-description": "critical",
"cvss-score": 9.8,
"cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
"links": [
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000409",
"https://www.exploit-db.com/exploits/43331",
"https://seclists.org/oss-sec/2017/q4/385",
"https://github.com/aliasrobotics/RVD/issues/1455"
],
"flaw": {
"phase": "explotation",
"specificity": "general issue",
"architectural-location": "platform code",
"application": "industrial robot manipulator",
"subsystem": "manipulation:actuation",
"package": "libc6 2.19-11 i386",
"languages": "C",
"date-detected": null,
"detected-by": "Victor Mayoral Vilches and Lander Usategui San Juan (Alias Robotics)",
"detected-by-method": "testing",
"date-reported": "2020-04-02",
"reported-by": "V\u00edctor Mayoral Vilches",
"reported-by-relationship": "security researcher",
"issue": "https://github.com/aliasrobotics/RVD/issues/1455",
"reproducibility": "always",
"trace": "N/A",
"reproduction": "Not available",
"reproduction-image": "Not available"
},
"exploitation": {
"description": "Buffer overflow in glibc's ld.so. Researchers discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). See https://www.exploit-db.com/exploits/43331 for a PoC available.",
"exploitation-image": "Not available",
"exploitation-vector": "Not available"
},
"mitigation": {
"description": "sudo apt-get --assume-yes install --only-upgrade libc6",
"pull-request": "Not available",
"date-mitigation": null
}
}
I'm keeping the triage label in here because I didn't have time yet to review if this is applicable in SW 1.12.1 and other previous versions of the CB3.1 control box.