CVE编号
CVE-2019-25013利用情况
暂无补丁情况
官方补丁披露时间
2021-01-05漏洞描述
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab... | |
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d... | |
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e... | |
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7... | |
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e... | |
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b22... | |
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37... | |
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0f... | |
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.netapp.com/advisory/ntap-20210205-0004/ | |
https://sourceware.org/bugzilla/show_bug.cgi?id=24973 | |
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | gnu | glibc | * |
Up to (including) 2.32 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | glibc | * |
Up to (excluding) 2.17-322.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | glibc | * |
Up to (excluding) 2.26-40.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | glibc | * |
Up to (excluding) 2.17-322.181.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | glibc | * |
Up to (excluding) 2.17-322.el7_9 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | glibc | * |
Up to (excluding) 2.28-151.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | glibc | * |
Up to (excluding) 2.28-10+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | glibc | * |
Up to (excluding) 2.31-6 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | glibc | * |
Up to (excluding) 2.24-11+deb9u4 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_32 | glibc | * |
Up to (excluding) 2.31-5.fc32 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_33 | glibc | * |
Up to (excluding) 2.32-3.fc33 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | glibc | * |
Up to (excluding) 2.26-lp152.26.6.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | glibc | * |
Up to (excluding) 2.17-322.0.2.el7_9 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | glibc | * |
Up to (excluding) 2.28-151.0.1.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | glibc | * |
Up to (excluding) 2.28-151.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | glibc | * |
Up to (excluding) 2.22-114.5.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 N/A
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 服务器失陷
- 全网数量 N/A
还没有评论,来说两句吧...