mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
21 lines
1.0 KiB
Markdown
21 lines
1.0 KiB
Markdown
### [CVE-2021-3999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.openwall.com/lists/oss-security/2022/01/24/4
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/flexiondotorg/CNCF-02
|
|
- https://github.com/maxim12z/ECommerce
|
|
- https://github.com/rootameen/vulpine
|
|
|