gnu glibc 跨界内存读

admin 2023-12-01 17:17:25 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 gnu glibc 跨界内存读

CVE编号

CVE-2019-25013

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2021-01-05
漏洞描述
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab...
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d...
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e...
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7...
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e...
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b22...
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37...
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0f...
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0...
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009...
https://www.oracle.com/security-alerts/cpuapr2022.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 gnu glibc * Up to (including) 2.32
运行在以下环境
系统 alibaba_cloud_linux_2.1903 glibc-utils * Up to (excluding) 2.17-322.1.al7
运行在以下环境
系统 amazon_2 glibc * Up to (excluding) 2.26-41.amzn2
运行在以下环境
系统 amazon_AMI glibc * Up to (excluding) 2.17-322.181.amzn1
运行在以下环境
系统 centos_7 glibc * Up to (excluding) 2.17-322.el7_9
运行在以下环境
系统 centos_8 glibc-langpack-sw * Up to (excluding) 2.28-151.el8
运行在以下环境
系统 debian_10 glibc * Up to (excluding) 2.28-10+deb10u2
运行在以下环境
系统 debian_11 glibc * Up to (excluding) 2.31-9
运行在以下环境
系统 debian_12 glibc * Up to (excluding) 2.31-9
运行在以下环境
系统 debian_9 glibc * Up to (including) 2.24-11+deb9u4
运行在以下环境
系统 debian_sid glibc * Up to (excluding) 2.31-9
运行在以下环境
系统 fedora_32 glibc-langpack-iu * Up to (excluding) 2.31-5.fc32
运行在以下环境
系统 fedora_33 glibc-langpack-iu * Up to (excluding) 2.32-3.fc33
运行在以下环境
系统 kylinos_aarch64_V10 glibc * Up to (excluding) 2.17-323.el7_9.ns7.01
运行在以下环境
系统 kylinos_aarch64_V10SP1 glibc * Up to (excluding) 2.28-36.p06.ky10
运行在以下环境
系统 kylinos_x86_64_V10 glibc * Up to (excluding) 2.17-323.el7_9.ns7.01
运行在以下环境
系统 kylinos_x86_64_V10SP1 glibc * Up to (excluding) 2.28-36.p06.ky10
运行在以下环境
系统 opensuse_Leap_15.2 glibc-i18ndata * Up to (excluding) 2.26-lp152.26.6.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 2.17-322.0.1.el7_9
运行在以下环境
系统 oracle_8 glibc-langpack-da * Up to (excluding) 2.28-151.0.1.ksplice1.el8
运行在以下环境
系统 redhat_7 glibc * Up to (excluding) 2.17-322.el7_9
运行在以下环境
系统 redhat_8 glibc-langpack-sw * Up to (excluding) 2.28-151.el8
运行在以下环境
系统 suse_12_SP5 glibc-devel * Up to (excluding) 2.22-114.5.1
运行在以下环境
系统 ubuntu_18.04 glibc * Up to (excluding) 2.27-3ubuntu1.5
运行在以下环境
系统 ubuntu_20.04 glibc * Up to (excluding) 2.31-0ubuntu9.7
阿里云评分 5.0
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 服务器失陷
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-125 跨界内存读
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0