7 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

29 Sep 2022 — A memory corruption vulnerability exists in the libpthread linuxthreads functionality of uClibC 0.9.33.2 and uClibC-ng 1.0.40. Thread allocation can lead to memory corruption. An attacker can create threads to trigger this vulnerability. Se presenta vulnerabilidad de corrupción de memoria en la funcionalidad libpthread linuxthreads de uClibC versión 0.9.33.2 y uClibC-ng versión 1.0.40. Una asignación de hilos puede conllevar a una corrupción de memoria. • https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

06 May 2022 — uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2. uClibc-ng versiones hasta 1.0.40 y uClibc versiones hasta 0.9.33.2, usan IDs de transacciones DNS predecibles que pueden conllevar a un envenenamiento de la caché DNS. Esto está relacionado con el restablecimiento de un valor a 0x2 • https://www.kb.cert.org/vuls/id/473698 • CWE-330: Use of Insufficiently Random Values •

CVSS: 9.8EPSS: 12%CPEs: 1EXPL: 0

03 May 2022 — uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. uClibc-ng versiones anteriores a1.0.37, son vulnerables a una envoltura de enteros en las funciones malloc-simple. Esta asignación de memoria inapropiada puede conllevar a una asignación de memoria arbitraria, resultando en un comportamiento no espera... • https://downloads.uclibc-ng.org/releases • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 1

10 Nov 2021 — In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur. En uClibc y uClibc-ng versiones anteriores a 1.0.39, el manejo incorre... • https://github.com/wbx-github/uclibc-ng/commit/0f822af0445e5348ce7b7bd8ce1204244f31d174 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 Mar 2017 — The __read_etc_hosts_r function in libc/inet/resolv.c in uClibc-ng before 1.0.12 allows remote DNS servers to cause a denial of service (infinite loop) via a crafted packet. La función __read_etc_hosts_r en libc/inet/resolv.c en uClibc-ng en versiones anteriores a 1.0.12 permite que los servidores DNS remotos causen una denegación de servicio (bucle infinito) a través de un paquete manipulado. • http://repo.or.cz/uclibc-ng.git/commit/6932f2282ba0578d6ca2f21eead920d6b78bc93c • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 Mar 2017 — The __decode_dotted function in libc/inet/resolv.c in uClibc-ng before 1.0.12 allows remote DNS servers to cause a denial of service (infinite loop) via vectors involving compressed items in a reply. La función __decode_dotted en libc/inet/resolv.c en uClibc-ng en versiones anteriores a 1.0.12 permite que los servidores DNS remotos causen una denegación de servicio (bucle infinito) a través de vectores que implican elementos comprimidos en una respuesta. • http://repo.or.cz/uclibc-ng.git/commit/d9c3a16dcab57d6b56225b9a67e9119cc9e2e4ac • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

27 Jan 2017 — Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function. Error de entero sin signo en libc/string/arm/memset.S en uClibc y uClibc-ng en versiones anteriores a 1.0.16 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) a través de un valor de longitud negativo para la función memset. • http://mailman.uclibc-ng.org/pipermail/devel/2016-July/001067.html •