Heap-Based Buffer Overflow Vulnerability in glibc Library

CVE-2023-6246
8.4HIGH

Key Information

Vendor
Red Hat
Status
Glibc
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Vendor
CVE Published:
31 January 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

Summary

A heap-based buffer overflow vulnerability was found in the __vsyslog_internal function of the glibc library, impacting various Linux distributions. This issue, known as CVE: CVE-2023-6246, can result in local privilege escalation, potentially granting unauthorized root access to the affected system. The vulnerability was introduced inadvertently in glibc 2.37 in August 2022 by a specific commit, and it affects major Linux distributions like Debian, Ubuntu, and Fedora. There are also additional vulnerabilities affecting GNU C Library discovered by Qualys, but CVE-2023-6246 is considered the most concerning. Organizations are advised to monitor and address these vulnerabilities promptly to prevent potential exploitation.

Affected Version(s)

glibc = 2.39

News Articles

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Risk change from: 7.8 to: 8.4 - (HIGH)

  • Vulnerability started trending.

  • Vulnerability published.

  • First article discovered by Security Affairs

  • Vulnerability Reserved.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database15 News Article(s)

Credit

Red Hat would like to thank Qualys Threat Research Unit for reporting this issue.
.