CVE-2020-29562

Published: Dic 04, 2020 Last Modified: Giu 09, 2025 EU-VD ID: EUVD-2020-21925 Aliases: GSD-2020-29562
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,8
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
LOW 2,1
Access Vector: network
Access Complexity: high
Authentication: single
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0005
Percentile
0,2th
Updated

EPSS Score Trend (Last 90 Days)

617

Reachable Assertion

Draft
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: C, Java, Not Language-Specific, Rust
View CWE Details
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Glibc by Gnu

Version Range Affected
From 2.30 (inclusive)
To 2.32 (inclusive)
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

E-Series Santricity Os Controller by Netapp

Version Range Affected
From 11.0.0 (inclusive)
To 11.60.3 (inclusive)
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff043…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
Exploit Issue Tracking Patch Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff043…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
Exploit Issue Tracking Patch Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=26923