Описание
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc's iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.
Отчет
The described vulnerability in the iconv() function of GNU C Library, particularly affecting ISO-2022-CN-EXT character set conversions, poses a important severity issue due to its potential for out-of-bound writes. Such buffer overflows can lead to arbitrary memory corruption, which can be exploited by attackers to execute arbitrary code, crash applications, or overwrite critical data structures, including neighboring variables. Given that the overflow can occur with specific, predictable values through SS2designation and SS3designation escape sequences, an attacker could craft malicious input to specifically trigger these overflows. Exploitation of this vulnerability could result in denial of service, privilege escalation, or even remote code execution, posing a significant threat to the security and integrity of affected systems.
Меры по смягчению последствий
This issue can be mitigated by removing the ISO-2022-CN-EXT from glibc-gconv-extra's modules configuration. This can be done by:
- Verify if the module is loaded by running:
If the grep output looks like the above, ISO-2022-CN-EXT module is enabled. 2) Disabled the module by editing the file located at /usr/lib64/gconv/gconv-modules.d/gconv-modules-extra.conf and comment the following lines. For RHEL 7 the file that needs to be edited is /usr/lib64/gconv/gconv-modules. This step requires to be executed by a privileged user:
For commenting those lines just add the '#' character at the beginning of mentioned lines:
- Update the iconv cache by running:
- Check if the module was disabled by running the first step again. This time ISO-2022-CN-EXT should not appear in the output. Please notice that disabling the mentioned gconv module may lead applications relying in the affected module to fail in converting characters and should be used as a temporary mitigation before being able to fully update the affected package.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | glibc | Not affected | ||
Red Hat Enterprise Linux 6 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 6 | glibc | Out of support scope | ||
Red Hat Enterprise Linux 6 | nss_db | Under investigation | ||
Red Hat Enterprise Linux 7 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 7 | glibc | Fixed | RHSA-2024:3588 | 04.06.2024 |
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2024:2722 | 07.05.2024 |
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2024:3269 | 22.05.2024 |
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2024:2722 | 07.05.2024 |
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2024:3269 | 22.05.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
The iconv() function in the GNU C Library versions 2.39 and older may ...
EPSS
8.8 High
CVSS3