Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-27618 CVE-2020-29562 CVE-2020-29573 |
CWE-ID | CWE-835 CWE-617 CWE-787 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE OpenStack Cloud Crowbar Operating systems & Components / Operating system SUSE Linux Enterprise Software Development Kit Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE OpenStack Cloud Operating systems & Components / Operating system glibc-devel-static Operating systems & Components / Operating system package or component glibc-info Operating systems & Components / Operating system package or component glibc-i18ndata Operating systems & Components / Operating system package or component glibc-html Operating systems & Components / Operating system package or component nscd-debuginfo Operating systems & Components / Operating system package or component nscd Operating systems & Components / Operating system package or component glibc-profile-32bit Operating systems & Components / Operating system package or component glibc-profile Operating systems & Components / Operating system package or component glibc-locale-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-locale-debuginfo Operating systems & Components / Operating system package or component glibc-locale-32bit Operating systems & Components / Operating system package or component glibc-locale Operating systems & Components / Operating system package or component glibc-devel-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-devel-debuginfo Operating systems & Components / Operating system package or component glibc-devel-32bit Operating systems & Components / Operating system package or component glibc-devel Operating systems & Components / Operating system package or component glibc-debugsource Operating systems & Components / Operating system package or component glibc-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-debuginfo Operating systems & Components / Operating system package or component glibc-32bit Operating systems & Components / Operating system package or component glibc Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU50404
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-27618
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within iconv implementation when processing multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings. A remote attacker can pass specially crafted data to the application, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package glibc to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 9
SUSE Linux Enterprise Software Development Kit: 12-SP5
SUSE Linux Enterprise Server for SAP: 12-SP4
SUSE Linux Enterprise Server: 12-SP4-LTSS - 12-SP5
SUSE OpenStack Cloud: 9
glibc-devel-static: before 2.22-114.8.3
glibc-info: before 2.22-114.8.3
glibc-i18ndata: before 2.22-114.8.3
glibc-html: before 2.22-114.8.3
nscd-debuginfo: before 2.22-114.8.3
nscd: before 2.22-114.8.3
glibc-profile-32bit: before 2.22-114.8.3
glibc-profile: before 2.22-114.8.3
glibc-locale-debuginfo-32bit: before 2.22-114.8.3
glibc-locale-debuginfo: before 2.22-114.8.3
glibc-locale-32bit: before 2.22-114.8.3
glibc-locale: before 2.22-114.8.3
glibc-devel-debuginfo-32bit: before 2.22-114.8.3
glibc-devel-debuginfo: before 2.22-114.8.3
glibc-devel-32bit: before 2.22-114.8.3
glibc-devel: before 2.22-114.8.3
glibc-debugsource: before 2.22-114.8.3
glibc-debuginfo-32bit: before 2.22-114.8.3
glibc-debuginfo: before 2.22-114.8.3
glibc-32bit: before 2.22-114.8.3
glibc: before 2.22-114.8.3
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211165-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU49670
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-29562
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion when converting UCS4 text containing an irreversible character in the iconv function in the GNU C Library (aka glibc or libc6). A remote attacker can pass specially crafted data to the library, trigger an assertion failure and preform a denial of service attack.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 9
SUSE Linux Enterprise Software Development Kit: 12-SP5
SUSE Linux Enterprise Server for SAP: 12-SP4
SUSE Linux Enterprise Server: 12-SP4-LTSS - 12-SP5
SUSE OpenStack Cloud: 9
glibc-devel-static: before 2.22-114.8.3
glibc-info: before 2.22-114.8.3
glibc-i18ndata: before 2.22-114.8.3
glibc-html: before 2.22-114.8.3
nscd-debuginfo: before 2.22-114.8.3
nscd: before 2.22-114.8.3
glibc-profile-32bit: before 2.22-114.8.3
glibc-profile: before 2.22-114.8.3
glibc-locale-debuginfo-32bit: before 2.22-114.8.3
glibc-locale-debuginfo: before 2.22-114.8.3
glibc-locale-32bit: before 2.22-114.8.3
glibc-locale: before 2.22-114.8.3
glibc-devel-debuginfo-32bit: before 2.22-114.8.3
glibc-devel-debuginfo: before 2.22-114.8.3
glibc-devel-32bit: before 2.22-114.8.3
glibc-devel: before 2.22-114.8.3
glibc-debugsource: before 2.22-114.8.3
glibc-debuginfo-32bit: before 2.22-114.8.3
glibc-debuginfo: before 2.22-114.8.3
glibc-32bit: before 2.22-114.8.3
glibc: before 2.22-114.8.3
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211165-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50362
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-29573
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary within the sysdeps/i386/ldbl2mpn.c in the GNU C Library on x86 systems. A remote attacker can pass specially crafted data to the application that uses the vulnerable version of glibc and crash it.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE OpenStack Cloud Crowbar: 9
SUSE Linux Enterprise Software Development Kit: 12-SP5
SUSE Linux Enterprise Server for SAP: 12-SP4
SUSE Linux Enterprise Server: 12-SP4-LTSS - 12-SP5
SUSE OpenStack Cloud: 9
glibc-devel-static: before 2.22-114.8.3
glibc-info: before 2.22-114.8.3
glibc-i18ndata: before 2.22-114.8.3
glibc-html: before 2.22-114.8.3
nscd-debuginfo: before 2.22-114.8.3
nscd: before 2.22-114.8.3
glibc-profile-32bit: before 2.22-114.8.3
glibc-profile: before 2.22-114.8.3
glibc-locale-debuginfo-32bit: before 2.22-114.8.3
glibc-locale-debuginfo: before 2.22-114.8.3
glibc-locale-32bit: before 2.22-114.8.3
glibc-locale: before 2.22-114.8.3
glibc-devel-debuginfo-32bit: before 2.22-114.8.3
glibc-devel-debuginfo: before 2.22-114.8.3
glibc-devel-32bit: before 2.22-114.8.3
glibc-devel: before 2.22-114.8.3
glibc-debugsource: before 2.22-114.8.3
glibc-debuginfo-32bit: before 2.22-114.8.3
glibc-debuginfo: before 2.22-114.8.3
glibc-32bit: before 2.22-114.8.3
glibc: before 2.22-114.8.3
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211165-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.