Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-2961 PoC — GNU C Library 安全漏洞

Source
Associated Vulnerability
Title:GNU C Library 安全漏洞 (CVE-2024-2961)
Description:GNU C Library(glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU C Library 2.39 及之前版本存在安全漏洞,该漏洞源于 iconv() 函数可能会缓冲区溢出,导致应用程序崩溃或覆盖相邻变量。
Description
CVE-2024–2961 Security Issue Mitigation Script
Readme
# CVE-2024-2961
CVE-2024–2961 Security Issue Mitigation Script

![poc](https://github.com/rvizx/CVE-2024-2961/assets/84989569/e6c34df1-9e9e-4bc9-8a15-20b9217b6cee)


## Description

This repository contains a Bash script to check and mitigate the buffer overflow vulnerability identified in GNU libc (glibc) versions 2.39 and older, known as CVE-2024-2961. This vulnerability affects PHP when the `iconv` function is used to translate request encodings to/from certain Chinese Extended encodings (ISO-2022-CN-EXT). If exploited, it can lead to potential wide-ranging impacts.


## Usage

### Prerequisites

- Ensure you have the necessary permissions to modify system configuration files.
- The script requires basic utilities such as `ldd`, `iconv`, `grep`, and `find` to be available on your system.

### Running the Script

```bash
git clone https://github.com/yourusername/CVE-2024-2961
cd CVE-2024-2961
chmod +x fix.sh
sudo ./fix.sh
```
File Snapshot

[4.0K] /data/pocs/f2f88365d2371498fbc0226f6f2e554c72fb1a0d ├── [1.3K] fix.sh └── [ 944] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.