Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-25139
HistoryFeb 03, 2023 - 12:00 a.m.

CVE-2023-25139

2023-02-0300:00:00
ubuntu.com
ubuntu.com
15
buffer overflow
gnu c library
out-of-bounds write
vulnerable code introduced

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

46.7%

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow
(out-of-bounds write) in some situations with a correct buffer size. This
is unrelated to CWE-676. It may write beyond the bounds of the destination
buffer when attempting to write a padded, thousands-separated string
representation of a number, if the buffer is allocated the exact size
required to represent that number as a string. For example, 1,234,567 (with
padding to 13) overflows by two bytes.

Bugs

Notes

Author Note
ccdm94 Debian: “Vulnerable code introduced in 2.37”.
OSVersionArchitecturePackageVersionFilename
ubuntu23.04noarchglibc< 2.37-0ubuntu2UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

46.7%