Show filters
1,191 Total Results
Displaying 51-60 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2023-4692
Disclosure Date: October 25, 2023 (last updated May 22, 2024)
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
0
Attacker Value
Unknown
CVE-2023-4156
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
0
Attacker Value
Unknown
CVE-2023-5156
Disclosure Date: September 25, 2023 (last updated April 25, 2024)
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
0
Attacker Value
Unknown
CVE-2023-4806
Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
0
Attacker Value
Unknown
CVE-2023-4527
Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
0
Attacker Value
Unknown
CVE-2023-25588
Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.
0
Attacker Value
Unknown
CVE-2023-25586
Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.
0
Attacker Value
Unknown
CVE-2023-25585
Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.
0
Attacker Value
Unknown
CVE-2023-25584
Disclosure Date: September 14, 2023 (last updated February 24, 2024)
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
0
Attacker Value
Unknown
CVE-2023-4039
Disclosure Date: September 13, 2023 (last updated June 13, 2024)
** DISPUTED **
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains
that target AArch64 allows an attacker to exploit an existing buffer
overflow in dynamically-sized local variables in your application
without this being detected. This stack-protector failure only applies
to C99-style dynamically-sized local variables or those created using
alloca(). The stack-protector operates as intended for statically-sized
local variables.
The default behavior when the stack-protector
detects an overflow is to terminate your application, resulting in
controlled loss of availability. An attacker who can exploit a buffer
overflow without triggering the stack-protector might be able to change
program flow control to cause an uncontrolled loss of availability or to
go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
0