5 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

29 Sep 2022 — A memory corruption vulnerability exists in the libpthread linuxthreads functionality of uClibC 0.9.33.2 and uClibC-ng 1.0.40. Thread allocation can lead to memory corruption. An attacker can create threads to trigger this vulnerability. Se presenta vulnerabilidad de corrupción de memoria en la funcionalidad libpthread linuxthreads de uClibC versión 0.9.33.2 y uClibC-ng versión 1.0.40. Una asignación de hilos puede conllevar a una corrupción de memoria. • https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

06 May 2022 — uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2. uClibc-ng versiones hasta 1.0.40 y uClibc versiones hasta 0.9.33.2, usan IDs de transacciones DNS predecibles que pueden conllevar a un envenenamiento de la caché DNS. Esto está relacionado con el restablecimiento de un valor a 0x2 • https://www.kb.cert.org/vuls/id/473698 • CWE-330: Use of Insufficiently Random Values •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 1

10 Nov 2021 — In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur. En uClibc y uClibc-ng versiones anteriores a 1.0.39, el manejo incorre... • https://github.com/wbx-github/uclibc-ng/commit/0f822af0445e5348ce7b7bd8ce1204244f31d174 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Jun 2017 — In uClibc 0.9.33.2, there is stack exhaustion (uncontrolled recursion) in the check_dst_limits_calc_pos_1 function in misc/regex/regexec.c when processing a crafted regular expression. En uClibc versión 0.9.33.2, se presenta un agotamiento de pila (recursión no controlada) en la función check_dst_limits_calc_pos_1 en el archivo misc/regex/ regexec.c cuando es procesada una expresión regular especialmente diseñada. • http://openwall.com/lists/oss-security/2017/06/16/4 • CWE-674: Uncontrolled Recursion •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

16 Jun 2017 — In uClibc 0.9.33.2, there is an out-of-bounds read in the get_subexp function in misc/regex/regexec.c when processing a crafted regular expression. En uClibc 0.9.33.2, hay una lectura fuera de los límites en la función get_subexp de misc/regex/regexec.c cuando se procesa una expresión regular manipulada. • http://openwall.com/lists/oss-security/2017/06/16/4 • CWE-125: Out-of-bounds Read •