CVE-2023-4806Use After Free in Glibc

Severity
5.9MEDIUMNVD
EPSS
1.9%
top 16.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18
Latest updateJan 10

Description

A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with A

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages5 packages

Debiangnu/glibc< 2.36-9+deb12u3+2
Ubuntugnu/glibc< 2.31-0ubuntu9.14+4
NVDgnu/glibc2.33

Also affects: Fedora 37, 38, 39, Enterprise Linux 7.0, 8.0, 9.0, 8.8, 9.2

🔴Vulnerability Details

5
OSV
glibc regression2024-01-10
OSV
glibc vulnerabilities2023-12-07
GHSA
GHSA-5f52-v49r-796w: A flaw was found in glibc2023-09-18
CVEList
Glibc: potential use-after-free in getaddrinfo()2023-09-18
OSV
CVE-2023-4806: A flaw has been identified in glibc2023-09-18

📋Vendor Advisories

6
Ubuntu
GNU C Library regression2024-01-10
Ubuntu
GNU C Library vulnerabilities2023-12-07
Red Hat
glibc: DoS due to memory leak in getaddrinfo.c2023-09-25
Red Hat
glibc: potential use-after-free in getaddrinfo()2023-09-12
Microsoft
Glibc: potential use-after-free in getaddrinfo()2023-09-12