Vulnerabilities > CVE-2020-6096 - Signed to Unsigned Conversion Error vulnerability in multiple products

047910
CVSS 8.1 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
high complexity
gnu
fedoraproject
debian
CWE-195

Summary

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.

Vulnerable Configurations

Part Description Count
Application
Gnu
127
OS
Fedoraproject
2
OS
Debian
1

Common Weakness Enumeration (CWE)

Talos

idTALOS-2020-1019
last seen2020-05-28
published2020-05-21
reporterTalos Intelligence
sourcehttp://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
titleGNU glibc ARMv7 memcpy() memory corruption vulnerability