9.8
CVSSv3

CVE-2023-0687

Published: 06/02/2023 Updated: 11/04/2024
CVSS v2 Base Score: 4 | Impact Score: 6.4 | Exploitability Score: 2.5
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 356
Vector: AV:A/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Summary

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc

Vendor Advisories

Description<!---->A vulnerability was found in the GNU C Library This flaw affects the __monstartup function of the gmonc of the component Call Graph Monitor file The manipulation leads to buffer overflowA vulnerability was found in the GNU C Library This flaw affects the __monstartup function of the gmonc of the component Call Graph Monitor ...