High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-2961
HighVulnerability Description
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Known Affected Software
108 configuration(s) from 3 vendor(s)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.35:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.38.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.33:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.18.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.97:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36.113:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.30.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.26.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.37.38:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.39.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.37:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.32.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.33.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.19.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.32.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.38.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.30:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.28.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.29.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.94:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.95:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.27.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.20.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.29:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.37.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.93:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.24.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.39:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.28:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.22.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.31.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.23.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.32:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.25.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.17.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:x64:*
cpe:2.3:a:gnu:glibc:2.34:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.96:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.27:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.38:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.21.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.34.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.35.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.24:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:netapp:hci_h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
http://www.openwall.com/lists/oss-security/2024/04/17/93ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/18/43ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/24/23ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/13ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/23ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/33ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/43ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/53ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/63ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/07/22/53ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html3ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/3ff69d7a-14f2-4f67-a097-88dee7810d18 Broken Link
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/3ff69d7a-14f2-4f67-a097-88dee7810d18 Broken Link
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/3ff69d7a-14f2-4f67-a097-88dee7810d18 Broken Link
-
https://security.netapp.com/advisory/ntap-20240531-0002/3ff69d7a-14f2-4f67-a097-88dee7810d18 Third Party Advisory
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-00043ff69d7a-14f2-4f67-a097-88dee7810d18 Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/17/9af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/18/4af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/24/2af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/2af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/3af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/4af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/5af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/05/27/6af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/07/22/5af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://security.netapp.com/advisory/ntap-20240531-0002/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.ambionics.io/blog/iconv-cve-2024-2961-p1af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://www.ambionics.io/blog/iconv-cve-2024-2961-p3af854a3a-2127-422b-91ae-364da2661108 Broken Link
Severity Details
Weakness Type (CWE)
Out-of-bounds Write
- Description
- The product writes data past the end, or before the beginning, of the intended buffer.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- April 17, 2024
