gnu glibc CVE-2020-1752 vulnerability in GNU and Other Products
Published on April 30, 2020

product logo product logo product logo product logo
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2020-1752 is exploitable with local system access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2020-1752 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2020-1752

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-1752 are published in these products:

 
 
 
 
 
 
 

Affected Versions

GNU Libc glibc:

Exploit Probability

EPSS
0.20%
Percentile
41.72%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.