Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2015-5180 CVE-2016-10228 CVE-2019-25013 CVE-2020-27618 CVE-2020-29562 CVE-2020-29573 CVE-2021-3326 |
CWE-ID | CWE-476 CWE-20 CWE-125 CWE-835 CWE-617 CWE-787 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server Operating systems & Components / Operating system nscd-debuginfo Operating systems & Components / Operating system package or component nscd Operating systems & Components / Operating system package or component glibc-profile-32bit Operating systems & Components / Operating system package or component glibc-profile Operating systems & Components / Operating system package or component glibc-locale-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-locale-debuginfo Operating systems & Components / Operating system package or component glibc-locale-32bit Operating systems & Components / Operating system package or component glibc-locale Operating systems & Components / Operating system package or component glibc-devel-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-devel-debuginfo Operating systems & Components / Operating system package or component glibc-devel-32bit Operating systems & Components / Operating system package or component glibc-devel Operating systems & Components / Operating system package or component glibc-debugsource Operating systems & Components / Operating system package or component glibc-debuginfo-32bit Operating systems & Components / Operating system package or component glibc-debuginfo Operating systems & Components / Operating system package or component glibc-32bit Operating systems & Components / Operating system package or component glibc Operating systems & Components / Operating system package or component glibc-info Operating systems & Components / Operating system package or component glibc-i18ndata Operating systems & Components / Operating system package or component glibc-html Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU12269
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2015-5180
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in res_query in libresolv due to NULL pointer dereference. A remote attacker can cause the service to crash.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54337
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-10228
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
MitigationUpdate the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50329
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-25013
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in GNU C Library within the iconv feature when processing multi-byte input sequences in the EUC-KR encoding. A remote attacker can pass specially crafted input to the application, trigger out-of-bounds read error and perform a denial of service (DoS) attack.
MitigationUpdate the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50404
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-27618
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within iconv implementation when processing multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings. A remote attacker can pass specially crafted data to the application, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU49670
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-29562
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion when converting UCS4 text containing an irreversible character in the iconv function in the GNU C Library (aka glibc or libc6). A remote attacker can pass specially crafted data to the library, trigger an assertion failure and preform a denial of service attack.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50362
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-29573
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary within the sysdeps/i386/ldbl2mpn.c in the GNU C Library on x86 systems. A remote attacker can pass specially crafted data to the application that uses the vulnerable version of glibc and crash it.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50075
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3326
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion within the iconv function in the GNU C Library (aka glibc or libc6) when processing invalid input sequences in the ISO-2022-JP-3 encoding. A remote attacker can pass specially crafted data to the application, trigger an assertion failure and crash the affected application.
Update the affected package glibc to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-BCL
nscd-debuginfo: before 2.22-126.1
nscd: before 2.22-126.1
glibc-profile-32bit: before 2.22-126.1
glibc-profile: before 2.22-126.1
glibc-locale-debuginfo-32bit: before 2.22-126.1
glibc-locale-debuginfo: before 2.22-126.1
glibc-locale-32bit: before 2.22-126.1
glibc-locale: before 2.22-126.1
glibc-devel-debuginfo-32bit: before 2.22-126.1
glibc-devel-debuginfo: before 2.22-126.1
glibc-devel-32bit: before 2.22-126.1
glibc-devel: before 2.22-126.1
glibc-debugsource: before 2.22-126.1
glibc-debuginfo-32bit: before 2.22-126.1
glibc-debuginfo: before 2.22-126.1
glibc-32bit: before 2.22-126.1
glibc: before 2.22-126.1
glibc-info: before 2.22-126.1
glibc-i18ndata: before 2.22-126.1
glibc-html: before 2.22-126.1
CPE2.3http://www.suse.com/support/update/announcement/2022/suse-su-20222886-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.