Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4373

Опубликовано: 06 мая 2025
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-124: Buffer Underwrite ('Buffer Underflow') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Secure baseline configurations enforce strict memory handling policies, while change controls ensure any deviations are reviewed and approved. Least functionality reduces the attack surface by disabling unnecessary features that could introduce memory risks. Process isolation contains faults within individual workloads, minimizing broader impact. Real-time monitoring and malicious code protection detect and respond to abnormal memory behavior or exploitation attempts. Hardened configuration settings restrict low-level memory access, lowering the likelihood of unsafe operations. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against buffer underwrite exploits.

Меры по смягчению последствий

Currently, no mitigation is available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10bootcFix deferred
Red Hat Enterprise Linux 10glib2Affected
Red Hat Enterprise Linux 10glycin-loadersFix deferred
Red Hat Enterprise Linux 10loupeFix deferred
Red Hat Enterprise Linux 10mingw-glib2Fix deferred
Red Hat Enterprise Linux 6glib2Fix deferred
Red Hat Enterprise Linux 7glib2Fix deferred
Red Hat Enterprise Linux 8glib2Affected
Red Hat Enterprise Linux 8librsvg2Fix deferred
Red Hat Enterprise Linux 8mingw-glib2Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-124
https://bugzilla.redhat.com/show_bug.cgi?id=2364265glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar

EPSS

Процентиль: 18%
0.00056
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVSS3: 4.8
nvd
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVSS3: 4.8
debian
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow i ...

CVSS3: 4.8
github
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

EPSS

Процентиль: 18%
0.00056
Низкий

4.8 Medium

CVSS3