Uninitialized Pointer Dereference Vulnerability

UNKNOWN No Patch (1869 days)

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Uninitialized Pointer Dereference Vulnerability is a buffer overflow vulnerability in the GNU C Library (glibc). It occurs when a program uses an uninitialized pointer to access memory. This can lead to arbitrary code execution, allowing attackers to inject malicious code into the program.

Am I affected?

This vulnerability affects versions of glibc prior to 2.27. The affected version range is: 2.23-2.26.
Check with: grep -qE 'uninitialized pointer dereference' /lib/libc.so.* on Linux systems, or use a tool like AddressSanitizer.

Affected Products

GNU Project / GNU C Library

How to fix

To fix this vulnerability, update to glibc 2.27 or later. On Debian-based systems, run apt-get update && apt-get install libglibc2.27-0. On Red Hat-based systems, run sudo yum update && sudo yum install glibc2.27.