{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1752", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "GNU Libc", "product": { "product_data": [ { "product_name": "glibc", "version": { "version_data": [ { "version_value": "Affected: versions 2.14 and later" }, { "version_value": "Fixed: version 2.32" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752", "refsource": "CONFIRM" }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25414", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=25414", "refsource": "CONFIRM" }, { "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c", "name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c", "refsource": "CONFIRM" }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200511-0005/", "url": "https://security.netapp.com/advisory/ntap-20200511-0005/" }, { "refsource": "UBUNTU", "name": "USN-4416-1", "url": "https://usn.ubuntu.com/4416-1/" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32." } ] }, "impact": { "cvss": [ [ { "vectorString": "7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] } }