CVE-2023-4806

2 days ago 53

Received


This vulnerability has been received by the NVD and has not been analyzed.

Description

A flaw was recovered successful glibc. In an highly uncommon situation, the getaddrinfo relation whitethorn entree representation that has been freed, resulting successful an exertion crash. This contented is lone exploitable erstwhile a NSS module implements lone the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved sanction should instrumentality a ample fig of IPv6 and IPv4, and the telephone to the getaddrinfo relation should person the AF_INET6 code household with AI_CANONNAME, AI_ALL and AI_V4MAPPED arsenic flags.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.


Nist CVSS people     does not lucifer  with CNA score

CNA:  Red Hat, Inc.

Vector:  CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Change History

0 alteration records recovered show changes

Read Entire Article