Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4527

Опубликовано: 12 сент. 2023
Источник: redhat
CVSS3: 6.5

Описание

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

Отчет

This issue only affects systems configured with no-aaaa mode via /etc/resolv.conf. The no-aaaa stub resolver option was backported only to Red Hat Enterprise Linux versions 8.7 and 9.1. Therefore, previous versions are not affected.

Меры по смягчению последствий

Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcFixedRHSA-2023:545505.10.2023
Red Hat Enterprise Linux 8glibcFixedRHSA-2023:545505.10.2023
Red Hat Enterprise Linux 9glibcFixedRHSA-2023:545305.10.2023
Red Hat Enterprise Linux 9glibcFixedRHSA-2023:545305.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2234712glibc: Stack read overflow in getaddrinfo in no-aaaa mode

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
nvd
почти 2 года назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
debian
почти 2 года назад

A flaw was found in glibc. When the getaddrinfo function is called wit ...

CVSS3: 6.5
github
почти 2 года назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
fstec
почти 2 года назад

Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании

6.5 Medium

CVSS3