Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-4806

Опубликовано: 18 сент. 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.9

Описание

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2.38-1ubuntu5
esm-infra/bionic

released

2.27-3ubuntu1.6+esm1
esm-infra/focal

not-affected

2.31-0ubuntu9.14
esm-infra/xenial

released

2.23-0ubuntu11.3+esm5
focal

released

2.31-0ubuntu9.14
jammy

released

2.35-0ubuntu3.5
lunar

released

2.37-0ubuntu2.2
mantic

released

2.38-1ubuntu5
noble

released

2.38-1ubuntu5

Показывать по

EPSS

Процентиль: 75%
0.00926
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
почти 2 года назад

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

CVSS3: 5.9
nvd
почти 2 года назад

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

CVSS3: 5.9
debian
почти 2 года назад

A flaw was found in glibc. In an extremely rare situation, the getaddr ...

CVSS3: 5.9
github
почти 2 года назад

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

CVSS3: 5.9
fstec
почти 2 года назад

Уязвимость функции getaddrinfo библиотеки GNU C (glibc), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00926
Низкий

5.9 Medium

CVSS3