关联漏洞
标题:
GNU C Library 安全漏洞
(CVE-2024-2961)
描述:GNU C Library(glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU C Library 2.39 及之前版本存在安全漏洞,该漏洞源于 iconv() 函数可能会缓冲区溢出,导致应用程序崩溃或覆盖相邻变量。
描述
CVE-2024–2961 Security Issue Mitigation Script
介绍
# CVE-2024-2961
CVE-2024–2961 Security Issue Mitigation Script

## Description
This repository contains a Bash script to check and mitigate the buffer overflow vulnerability identified in GNU libc (glibc) versions 2.39 and older, known as CVE-2024-2961. This vulnerability affects PHP when the `iconv` function is used to translate request encodings to/from certain Chinese Extended encodings (ISO-2022-CN-EXT). If exploited, it can lead to potential wide-ranging impacts.
## Usage
### Prerequisites
- Ensure you have the necessary permissions to modify system configuration files.
- The script requires basic utilities such as `ldd`, `iconv`, `grep`, and `find` to be available on your system.
### Running the Script
```bash
git clone https://github.com/yourusername/CVE-2024-2961
cd CVE-2024-2961
chmod +x fix.sh
sudo ./fix.sh
```
文件快照
[4.0K] /data/pocs/f2f88365d2371498fbc0226f6f2e554c72fb1a0d
├── [1.3K] fix.sh
└── [ 944] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。