CVE-2013-4458

CVSS V2 Medium 5 CVSS V3 None
Description
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
Overview
  • CVE ID
  • CVE-2013-4458
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-12-12T18:55:10
  • Last Modified Date
  • 2023-02-13T04:46:58
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* 1 OR 2.18
cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 09:41:06 Added to TrackCVE
2022-12-01 21:12:38 2013-12-12T18:55Z 2013-12-12T18:55:10 CVE Published Date updated
2022-12-01 21:12:38 2017-07-01T01:29:04 CVE Modified Date updated
2022-12-01 21:12:38 Modified Vulnerability Status updated
2023-02-02 21:04:03 2023-02-02T20:15:42 CVE Modified Date updated
2023-02-02 21:04:03 Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914. It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. Description updated
2023-02-02 21:04:10 References updated
2023-02-13 05:06:17 2023-02-13T04:46:58 CVE Modified Date updated
2023-02-13 05:06:17 It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914. Description updated