Buffer Overflow Vulnerability in GNU C Library's iconv() Function

CVE-2024-2961
Currently unrated 🤨

Key Information

Vendor
The Gnu C Library
Status
Glibc
Vendor
Published:
17 April 2024

Badges

👾 Exploit Exists🙃 Public PoC📰 News Worthy

Summary

The GNU C Library has identified a buffer overflow vulnerability in the iconv() function when converting strings to the ISO-2022-CN-EXT character set, affecting versions 2.39 and older. This vulnerability could potentially cause an application to crash or overwrite a neighboring variable. There are no known exploitations of this vulnerability at this time, and no indication of ransomware groups targeting this specific issue. The GNU C Library has released a security advisory and fix for the vulnerability.

Affected Version(s)

glibc < 2.40

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Timeline

  • 👾

    Exploit exists.

  • First article discovered by daily.dev

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)9 News Article(s)

Credit

Charles Fol
.