CVE-2020-6096
CVSS V2 Medium 6.8
CVSS V3 High 8.1
Description
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.
Overview
- CVE ID
- CVE-2020-6096
- Assigner
- talos-cna@cisco.com
- Vulnerability Status
- Analyzed
- Published Version
- 2020-04-01T22:15:18
- Last Modified Date
- 2022-11-21T19:39:51
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | 1 | OR | 2.31 | |
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202101-20 | Third Party Advisory |
https://sourceware.org/bugzilla/show_bug.cgi?id=25620 | Issue Tracking Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019 | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-6096 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-04-20 17:02:04 | Added to TrackCVE | |||
2022-12-04 13:50:46 | 2020-04-01T22:15Z | 2020-04-01T22:15:18 | CVE Published Date | updated |
2022-12-04 13:50:46 | 2022-11-21T19:39:51 | CVE Modified Date | updated | |
2022-12-04 13:50:46 | Analyzed | Vulnerability Status | updated | |
2022-12-04 13:50:50 | References | updated |