Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-25139

Опубликовано: 03 фев. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

A vulnerability was found in glibc. When the printf family of functions is called with a format specifier that uses an apostrophe (enable grouping) and a minimum width specifier, the resulting output could be larger than reasonably expected by a caller that computed a tight bound on the buffer size. The resulting larger-than-expected output could result in a buffer overflow in the printf family of functions.

Отчет

The glibc package as shipped with Red Hat Enterprise Linux 6, 7, 8 and 9 is not affected by this vulnerability because this issue is specific to glibc 2.37. This glibc version is not distributed by any version of Red Hat Enterprise Linux.

Меры по смягчению последствий

An application compiled with stack protector enabled can mitigate this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected
Red Hat Enterprise Linux 9glibcNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-682->CWE-120
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2167666glibc: incorrect printf output for integers with thousands separator and width field

EPSS

Процентиль: 35%
0.00144
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
nvd
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
debian
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-o ...

CVSS3: 9.8
github
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость функции sprintf библиотеки GNU C (glibc), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 35%
0.00144
Низкий

7.5 High

CVSS3