Language:
https://lists.debian.org/debian-lts-announce/2017/06/msg00021.html
https://packages.debian.org/source/wheezy/eglibc
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Severity: High
ID: 100875
File Name: debian_DLA-992.nasl
Version: 3.10
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 6/20/2017
Updated: 1/11/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:glibc-doc, p-cpe:/a:debian:debian_linux:libc6-dev-ppc64, p-cpe:/a:debian:debian_linux:libc6-xen, p-cpe:/a:debian:debian_linux:libc6.1-pic, p-cpe:/a:debian:debian_linux:libc6-dev-sparc64, p-cpe:/a:debian:debian_linux:libc6-i686, p-cpe:/a:debian:debian_linux:libc6-dev-mipsn32, p-cpe:/a:debian:debian_linux:libc6-i386, p-cpe:/a:debian:debian_linux:libc-dev-bin, p-cpe:/a:debian:debian_linux:libc0.1-dbg, p-cpe:/a:debian:debian_linux:libc6.1, p-cpe:/a:debian:debian_linux:libc0.1-dev-i386, p-cpe:/a:debian:debian_linux:libc0.1-prof, p-cpe:/a:debian:debian_linux:libc6-sparc64, p-cpe:/a:debian:debian_linux:libc6-dev-s390, p-cpe:/a:debian:debian_linux:libc6-ppc64, p-cpe:/a:debian:debian_linux:libc6-mipsn32, p-cpe:/a:debian:debian_linux:eglibc-source, p-cpe:/a:debian:debian_linux:libc6-amd64, p-cpe:/a:debian:debian_linux:libc0.1-pic, p-cpe:/a:debian:debian_linux:libc0.1, p-cpe:/a:debian:debian_linux:libc0.1-i386, cpe:/o:debian:debian_linux:7.0, p-cpe:/a:debian:debian_linux:libc6-dev-amd64, p-cpe:/a:debian:debian_linux:locales-all, p-cpe:/a:debian:debian_linux:libc6-dev-s390x, p-cpe:/a:debian:debian_linux:libc6-s390x, p-cpe:/a:debian:debian_linux:libc6.1-prof, p-cpe:/a:debian:debian_linux:libc0.1-dev, p-cpe:/a:debian:debian_linux:libc6-loongson2f, p-cpe:/a:debian:debian_linux:libc6.1-dev, p-cpe:/a:debian:debian_linux:multiarch-support, p-cpe:/a:debian:debian_linux:nscd, p-cpe:/a:debian:debian_linux:libc6-dev-i386, p-cpe:/a:debian:debian_linux:libc6-prof, p-cpe:/a:debian:debian_linux:libc6-s390, p-cpe:/a:debian:debian_linux:libc6.1-dbg, p-cpe:/a:debian:debian_linux:locales, p-cpe:/a:debian:debian_linux:libc6-mips64, p-cpe:/a:debian:debian_linux:libc6-dev-mips64, p-cpe:/a:debian:debian_linux:libc-bin, p-cpe:/a:debian:debian_linux:libc6, p-cpe:/a:debian:debian_linux:libc6-dbg, p-cpe:/a:debian:debian_linux:libc6-pic, p-cpe:/a:debian:debian_linux:libc0.1-i686, p-cpe:/a:debian:debian_linux:libc6-dev
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/19/2017
Vulnerability Publication Date: 6/19/2017
CVE: CVE-2017-1000366