CVE-2023-4527
Published on: Not Yet Published
Last Modified on: 09/22/2023 05:52:00 PM UTC
Certain versions of Glibc from Gnu contain the following vulnerability:
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
- CVE-2023-4527 has been assigned by
seca[email protected] to track the vulnerability - currently rated as MEDIUM severity.
Vulnerability Patch/Work Around
- Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | LOW | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
cve-details | access.redhat.com text/html |
![]() |
2234712 – (CVE-2023-4527) CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode | bugzilla.redhat.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Gnu | Glibc | All | All | All | All |
Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
Operating System | Redhat | Enterprise Linux | 9.0 | All | All | All |
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE