An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2024/Feb/3 | mailing list third party advisory exploit |
https://access.redhat.com/security/cve/CVE-2023-6780 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2254396 | issue tracking |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/ | mailing list |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/ | mailing list |
https://security.gentoo.org/glsa/202402-01 | third party advisory |
https://www.openwall.com/lists/oss-security/2024/01/30/6 | exploit mailing list |
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt | third party advisory |
https://security.netapp.com/advisory/ntap-20250207-0010/ |