Miggo Logo

CVE-2023-4813:
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that...

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.53189%
Published
9/13/2023
Updated
4/30/2025
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description and linked discussions clearly point to gaih_inet as the function containing the use-after-free bug. The getaddrinfo function is mentioned as the trigger for this vulnerability under specific system configurations. Although the direct patch content could not be analyzed, the provided URLs and their content give sufficient information to identify these functions. The file path for gaih_inet is inferred from common glibc structure and the patch URL, but the exact path for getaddrinfo is not available without inspecting the codebase or patch details.

Initially, I attempted to fetch the content of the Bugzilla and oss-security URLs to gather more context. Then, I tried to fetch the commit information using the patch URL found in the Bugzilla report. Since get_commit_infos did not return data for the sourceware.org git link, I proceeded based on the textual information available in the fetched URL contents and the vulnerability description itself. The gaih_inet function is explicitly named as containing the use-after-free. The getaddrinfo function is named as the entry point that triggers the vulnerable condition in gaih_inet. Confidence for gaih_inet is medium because while it's directly named, the patch wasn't analyzed. Confidence for getaddrinfo is also medium as it's an essential part of the exploit chain but not the site of the UAF itself. The file path for gaih_inet is an educated guess based on typical glibc structure (resolv/ for resolver functions) and the patch URL often containing path hints, though this specific URL did not directly show it. The file path for getaddrinfo is marked unknown as it's a more generic API function and its location isn't immediately obvious without code browsing or patch details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in *li**. In *n un*ommon situ*tion, t** **i*_in*t *un*tion m*y us* m*mory t**t **s ***n *r***, r*sultin* in *n *ppli**tion *r*s*. T*is issu* is only *xploit**l* w**n t** **t***rin*o *un*tion is **ll** *n* t** *osts **t***s* in /*t*/n

Reasoning

T** vuln*r**ility **s*ription *n* link** *is*ussions *l**rly point to `**i*_in*t` *s t** *un*tion *ont*inin* t** us*-**t*r-*r** *u*. T** `**t***rin*o` *un*tion is m*ntion** *s t** tri***r *or t*is vuln*r**ility un**r sp**i*i* syst*m *on*i*ur*tions. *