Skip to main content
Version: latest

CVE-2023-6779

CVE Details

Visit the official vulnerability details page for CVE-2023-6779 to learn more.

Initial Publication

10/25/2024

Last Update

12/16/2024

Third Party Dependency

libc6

NIST CVE Summary

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.

CVE Severity

7.5

Our Official Summary

A buffer overflow occurs when a program tries to write more data into a buffer than it can hold. In this case, an attacker can send a specially crafted input to a vulnerable program, causing it to overwrite adjacent memory locations and potentially execute malicious code. This can lead to a wide range of consequences, including unauthorized access, data theft, or system crashes.

This is reported on a few of the third party images for which an upstream fix is not available. Probability of exploitation is less likely as attackers need privileged access to these containers and sufficient controls are in place to prevent that. We will wait for the upstream fix to become available.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.15⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.11⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.10⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.8⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.5⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.4⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.4.20⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
12/16/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11, 4.5.15
12/11/2024Official summary revised: A buffer overflow occurs when a program tries to write more data into a buffer than it can hold. In this case, an attacker can send a specially crafted input to a vulnerable program, causing it to overwrite adjacent memory locations and potentially execute malicious code. This can lead to a wide range of consequences, including unauthorized access, data theft, or system crashes.This is reported on a few of the third party images for which an upstream fix is not available. Probability of exploitation is less likely as attackers need privileged access to thesecontainers and sufficient controls are in place to prevent that. We will wait for the upstream fix to become available.
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11
11/15/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10
11/13/2024Impacted versions changed from 4.5.4, 4.5.5, 4.5.8 to 4.5.4, 4.5.5, 4.5.8, 4.4.20
11/10/2024Impacted versions changed from 4.5.4, 4.5.5 to 4.5.4, 4.5.5, 4.5.8
10/27/2024Impacted versions changed from 4.5.4 to 4.5.4, 4.5.5