glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-992-1 eglibc security update
Debian DSA Debian DSA DSA-3887-1 glibc security update
EUVD EUVD EUVD-2017-1525 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
Ubuntu USN Ubuntu USN USN-3323-1 GNU C Library vulnerability
Ubuntu USN Ubuntu USN USN-3323-2 GNU C Library vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.10404}

epss

{'score': 0.07151}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T22:00:39.873Z

Reserved: 2017-06-19T00:00:00

Link: CVE-2017-1000366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-06-19T16:29:00.310

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-1000366

cve-icon Redhat

Severity : Important

Publid Date: 2017-06-19T00:00:00Z

Links: CVE-2017-1000366 - Bugzilla

cve-icon OpenCVE Enrichment

No data.