CVE-2023-4527 - Out-of-bounds Read

Severity

82%

Complexity

39%

Confidentiality

70%

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS 3.1 Base Score 8.2. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H).

CVSS 3.1 Base Score 6.5. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 1 year ago

2023-09-18 17:15:00

Last updated 1 year ago

2023-12-28 16:23:00

Affected Software

GNU glibc

Red Hat Enterprise Linux 8.0

8.0

References

https://bugzilla.redhat.com/show_bug.cgi?id=2234712

https://access.redhat.com/security/cve/CVE-2023-4527

https://bugzilla.redhat.com/show_bug.cgi?id=2234712

Exploit, Issue Tracking, Third Party Advisory

https://access.redhat.com/security/cve/CVE-2023-4527

Third Party Advisory

http://www.openwall.com/lists/oss-security/2023/09/25/1

https://security.gentoo.org/glsa/202310-03

https://lists.fedoraproject.org/archives/list/[email protected]/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/

https://lists.fedoraproject.org/archives/list/[email protected]/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/

https://lists.fedoraproject.org/archives/list/[email protected]/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/

https://access.redhat.com/errata/RHSA-2023:5453

https://access.redhat.com/errata/RHSA-2023:5455

http://www.openwall.com/lists/oss-security/2023/09/25/1

Mailing List

https://security.gentoo.org/glsa/202310-03

Third Party Advisory

https://lists.fedoraproject.org/archives/list/[email protected]/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/

Mailing List

https://lists.fedoraproject.org/archives/list/[email protected]/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/

Mailing List

https://lists.fedoraproject.org/archives/list/[email protected]/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/

Mailing List

https://access.redhat.com/errata/RHSA-2023:5453

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5455

Third Party Advisory

https://security.netapp.com/advisory/ntap-20231116-0012/

https://security.netapp.com/advisory/ntap-20231116-0012/

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.