Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-27618

Опубликовано: 09 июл. 2020
Источник: redhat
CVSS3: 5.5

Описание

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.

A flaw was found in glibc. If an attacker provides the iconv function with invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, it fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service.

Отчет

Red Hat Product Security has rated this flaw as a "Low" severity rating because the affected encodings are uncommon, and an attacker would need to either have local privileges or depend on an application feeding untrusted encoding input to iconv. Low and Moderate severity flaws are out of support scope for glibc as shipped with:

  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 7 For more detailed information about Red Hat Enterprise Linux support phases, please see [1].
  1. https://access.redhat.com/support/policy/updates/errata

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5compat-glibcOut of support scope
Red Hat Enterprise Linux 5glibcOut of support scope
Red Hat Enterprise Linux 6compat-glibcOut of support scope
Red Hat Enterprise Linux 6glibcOut of support scope
Red Hat Enterprise Linux 7compat-glibcOut of support scope
Red Hat Enterprise Linux 7glibcOut of support scope
Red Hat Enterprise Linux 8glibcFixedRHSA-2021:158518.05.2021
Red Hat Enterprise Linux 8glibcFixedRHSA-2021:158518.05.2021

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=1893708glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.

CVSS3: 5.5
nvd
больше 4 лет назад

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.

CVSS3: 5.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 5.5
debian
больше 4 лет назад

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and ...

CVSS3: 5.5
github
около 3 лет назад

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.

5.5 Medium

CVSS3