CVE-2023-4813
moderate-risk
Published 2023-09-12
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (18)
Enterprise Linux For Ibm Z Systems S390X
Affected Vendors
References (13)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:5453
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:5455
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7409
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4813
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:5453
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:5455
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7409
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4813
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
38
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
19/34 · Moderate