Denial of service in GNU glibc

Published: 2023-09-25
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2023-4527
Exploitation vector Network
Public exploit N/A
Vulnerable software
Universal components / Libraries / Libraries used by multiple products

Vendor GNU

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU81097

Risk: Medium


CVE-ID: CVE-2023-4527

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No


The vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the getaddrinfo() function called with the AF_UNSPEC address family. A remote attacker with control over DNS server can send a DNS response via TCP larger than 2048 bytes, trigger an out-of-bounds read and crash the application or gain access to potentially sensitive information.

Successful exploitation of the vulnerability requires that system is configured with no-aaaa mode via /etc/resolv.conf.


Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Glibc: 2.0 - 2.38.9000

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?