CVE-2013-4357
📋 TL;DR
A buffer overflow vulnerability in eglibc's getaddrinfo() function allows attackers to cause denial of service through specially crafted DNS responses. This affects systems using eglibc versions before 2.14 for DNS resolution.
💻 Affected Systems
- eglibc (Embedded GLIBC)
📦 What is this software?
Eglibc by Eglibc
Fedora by Fedoraproject
Fedora by Fedoraproject
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, though this is theoretical and not demonstrated for this specific CVE.
Likely Case
Denial of service causing application crashes or system instability when processing malicious DNS responses.
If Mitigated
Limited impact with proper network segmentation and DNS filtering preventing malicious responses from reaching vulnerable systems.
🎯 Exploit Status
Exploitation requires ability to send malicious DNS responses to target system, typically through DNS poisoning or controlling DNS server.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: eglibc 2.14 and later
Vendor Advisory: http://www.openwall.com/lists/oss-security/2013/09/17/4
Restart Required: Yes
Instructions:
1. Update eglibc package to version 2.14 or later using your distribution's package manager. 2. For Debian/Ubuntu: sudo apt-get update && sudo apt-get install eglibc. 3. Restart affected services or reboot system.
🔧 Temporary Workarounds
DNS Response Filtering
linuxConfigure DNS servers to filter or validate responses before forwarding to clients
Network Segmentation
allIsolate vulnerable systems from untrusted DNS sources
🧯 If You Can't Patch
- Implement strict DNS server whitelisting to only allow trusted DNS servers
- Deploy network monitoring for abnormal DNS response patterns and implement rate limiting
🔍 How to Verify
Check if Vulnerable:
Check eglibc version: dpkg -l | grep eglibc or rpm -qa | grep eglibc. If version is earlier than 2.14, system is vulnerable.
Check Version:
dpkg -l | grep eglibc || rpm -qa | grep eglibc || ldd --version | head -1
Verify Fix Applied:
Verify eglibc version is 2.14 or later using same commands. Test DNS resolution functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- Application crashes related to DNS resolution
- Segmentation faults in processes using getaddrinfo()
- Abnormal DNS query patterns
Network Indicators:
- Unusual DNS response sizes or patterns
- DNS responses from unexpected sources
SIEM Query:
process:segfault AND (process_name:*dns* OR process_name:*network*) OR dns:response_size>threshold
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html
- http://www.openwall.com/lists/oss-security/2013/09/17/4
- http://www.openwall.com/lists/oss-security/2013/09/17/8
- http://www.openwall.com/lists/oss-security/2015/01/28/18
- http://www.openwall.com/lists/oss-security/2015/01/29/21
- http://www.openwall.com/lists/oss-security/2015/02/24/3
- http://www.securityfocus.com/bid/67992
- http://www.ubuntu.com/usn/USN-2306-1
- http://www.ubuntu.com/usn/USN-2306-2
- http://www.ubuntu.com/usn/USN-2306-3
- https://access.redhat.com/security/cve/cve-2013-4357
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95103
- https://security-tracker.debian.org/tracker/CVE-2013-4357
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html
- http://www.openwall.com/lists/oss-security/2013/09/17/4
- http://www.openwall.com/lists/oss-security/2013/09/17/8
- http://www.openwall.com/lists/oss-security/2015/01/28/18
- http://www.openwall.com/lists/oss-security/2015/01/29/21
- http://www.openwall.com/lists/oss-security/2015/02/24/3
- http://www.securityfocus.com/bid/67992
- http://www.ubuntu.com/usn/USN-2306-1
- http://www.ubuntu.com/usn/USN-2306-2
- http://www.ubuntu.com/usn/USN-2306-3
- https://access.redhat.com/security/cve/cve-2013-4357
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95103
- https://security-tracker.debian.org/tracker/CVE-2013-4357