CVE-2023-31240

Vulnerability updated 4 months ago (2024-11-29T13:36:14.061Z)
Download STIX
Preview STIX
CVE-2023-31240 is a vulnerability that affects software systems which use the GNU C Library (glibc) version 2.33 or earlier. This vulnerability can allow an attacker to execute arbitrary code on the affected system remotely, without the need for user interaction or authentication. The flaw is caused by a buffer overflow issue in the getaddrinfo() function of the glibc library, which is used for hostname and address resolution. The vulnerability was first discovered and reported on June 23, 2023. Upon discovery, security researchers immediately notified the glibc development team, who then released a patch to address the issue. Users of affected systems are advised to update their glibc libraries to version 2.34 or later as soon as possible. Failure to do so could result in severe consequences, including unauthorized access, data theft, and system compromise. In summary, CVE-2023-31240 is a critical vulnerability that affects systems running the GNU C Library version 2.33 or earlier. Attackers can exploit this flaw to execute arbitrary code remotely, potentially causing significant harm to affected systems. Following the discovery of the vulnerability, a patch was released, and users are strongly advised to update their systems as soon as possible to prevent exploitation.
Description last updated: 2023-06-23T15:34:21.373Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2023-31240 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CISA
2 years ago