
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A vulnerability was discovered in glibc (CVE-2023-4527) that affects systems configured with no-aaaa mode via /etc/resolv.conf. The issue was introduced in glibc version 2.36 and affects versions prior to 2.39. When the getaddrinfo function is called with the AF_UNSPEC address family and a DNS response via TCP larger than 2048 bytes is received, it can potentially disclose stack contents through the function returned address data, and may cause a crash (NVD, Red Hat).
The vulnerability stems from the implementation of the no-aaaa stub resolver option in glibc. The issue occurs specifically when three conditions are met: the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called with AF_UNSPEC address family, and a DNS response over TCP exceeds 2048 bytes. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H (Red Hat).
The successful exploitation of this vulnerability can lead to the disclosure of sensitive information through stack contents via the returned address data. Additionally, it may cause system crashes. The vulnerability affects systems where the no-aaaa diagnostic option is enabled in /etc/resolv.conf (Openwall).
The primary mitigation is to update to a patched version of glibc. For systems that cannot be immediately updated, removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw. The vulnerability has been fixed in glibc versions 2.36-14.fc37 for Fedora 37, 2.37-10.fc38 for Fedora 38, and 2.38-6.fc39 for Fedora 39, as well as in corresponding Red Hat Enterprise Linux updates (Fedora).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”