CVE-2023-4527Stack-based Buffer Overflow in Glibc

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 71.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18
Latest updateOct 3

Description

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:HExploitability: 2.2 | Impact: 4.2

Affected Packages4 packages

NVDgnu/glibc2.362.36.113+2
Debiangnu/glibc< 2.36-9+deb12u3+2

Also affects: Fedora 37, 38, 39, Enterprise Linux 8.0, 9.0, 8.8, 9.2

🔴Vulnerability Details

4
OSV
glibc vulnerabilities2023-10-03
OSV
CVE-2023-4527: A flaw was found in glibc2023-09-18
GHSA
GHSA-hmf7-f8gf-8f4p: A flaw was found in glibc2023-09-18
CVEList
Glibc: stack read overflow in getaddrinfo in no-aaaa mode2023-09-18

📋Vendor Advisories

4
Ubuntu
GNU C Library vulnerabilities2023-10-03
Microsoft
Glibc: stack read overflow in getaddrinfo in no-aaaa mode2023-09-12
Red Hat
glibc: Stack read overflow in getaddrinfo in no-aaaa mode2023-09-12
Debian
CVE-2023-4527: glibc - A flaw was found in glibc. When the getaddrinfo function is called with the AF_U...2023