8.1
CVSSv3

CVE-2020-6096

Published: 01/04/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

It exists that the GNU C Library nscd daemon incorrectly handled certain netgroup lookups. An attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-27645)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc

fedoraproject fedora 31

fedoraproject fedora 32

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #961452 CVE-2020-6096 Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 24 May 2020 17:36:02 UTC Severity: important Tags: security Forwarded to sourcewareorg/bugzilla/ ...
Several security issues were fixed in GNU C Library ...
The iconv program in the GNU C Library (aka glibc or libc6) 231 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service (CVE-2016-10228) A flaw was found in glibc When pro ...

Github Repositories

Container build repository

Container build process The source code was taken from: githubcom/paulbouwer/hello-kubernetes Repository with images: quayio/repository/petr_ruzicka/myc-hello-kubernetes?tab=tags Requirements Generic Multiple Dockerfile files / sources in one git repository Multi-arch container images for each Dockerfile Image should be signed (cosign) SBOM (Software Bill Of

cve_web_scrapper I am planning to scrap internet for CVE This will enable to get information of CVE without opening URLs This work is 2% complete at this moment Some installs sudo apt install libxml2-utils sudo apt-get install libxml2-dev sudo apt-get install libxml2 How to Use it cve_web_scrapper$ /mainsh Start with web scrapping CVE-2020-6096 Not using Pyhton Now , SO one c

CVE 2020-6096 PoC

cve2020-6096 CVE 2020-6096 PoC - memcpy+168 still needed to build the RoP + shellcode Base on article released from Talos (Cisco) talosintelligencecom/vulnerability_reports/TALOS-2020-1019 blogtalosintelligencecom/2020/05/cve-2020-6096html 2020-06-11 18:24:03661 3569-3569/comkashacve2020_6096 I/exploit: before memcpy --------- beginning of crash 2020-06-1