跳转到帖子

Red Hat JBossEAP: Out-of-bounds Write (CVE-2024-2961)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Out-of-bounds Write (CVE-2024-2961)

Severity
6
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:C)
Published
04/17/2024
Created
12/24/2024
Added
12/20/2024
Modified
12/20/2024

Description

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.. An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc's iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-2961
  • CVE - 2024-2961
  • https://access.redhat.com/security/cve/CVE-2024-2961
  • https://bugzilla.redhat.com/show_bug.cgi?id=2273404
  • https://www.openwall.com/lists/oss-security/2024/04/17/9
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…