Glibc: off-by-one heap-based buffer overflow in __vsyslog_internal()
CVE-2023-6779
7.5HIGH
Summary
An off-by-one heap-based buffer overflow was identified in the __vsyslog_internal function within the glibc library. When the syslog and vsyslog functions are invoked with a message exceeding INT_MAX bytes, it leads to improper calculations of the buffer size allocated for the message. This flaw may cause application crashes and can potentially be exploited if the affected functions are manipulated. The vulnerability impacts glibc versions 2.37 and newer, necessitating immediate attention from system administrators and software developers utilizing this library.
Affected Version(s)
glibc 2.39
News Articles
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 📰
First article discovered by Qualys Security Blog
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database1 News Article(s)
Credit
Red Hat would like to thank Qualys Threat Research Unit for reporting this issue.