cve/2019/CVE-2019-1010025.md

24 lines
1004 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1010025](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010025)
![](https://img.shields.io/static/v1?label=Product&message=glibc&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Mitigation%20bypass&color=brighgreen)
### Description
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability."
### POC
#### Reference
- https://sourceware.org/bugzilla/show_bug.cgi?id=22853
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DanMolz/wiz-scripts
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/cdupuis/image-api
- https://github.com/fokypoky/places-list
- https://github.com/garethr/snykout