An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.
No PoCs from references.
- https://github.com/0xDeCA10B/attackfinder
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Frannc0/test2
- https://github.com/KashaMalaga/cve2020-6096
- https://github.com/Live-Hack-CVE/CVE-2020-6096
- https://github.com/NeXTLinux/griffon
- https://github.com/VAN-ALLY/Anchore
- https://github.com/anchore/grype
- https://github.com/aymankhder/scanner-for-container
- https://github.com/dispera/giant-squid
- https://github.com/domyrtille/interview_project
- https://github.com/epequeno/devops-demo
- https://github.com/garethr/snykout
- https://github.com/khulnasoft-labs/griffon
- https://github.com/kumarmadhu123/cve_web_scrapper
- https://github.com/marklogic/marklogic-docker
- https://github.com/metapull/attackfinder
- https://github.com/nedenwalker/spring-boot-app-using-gradle
- https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
- https://github.com/onzack/trivy-multiscanner
- https://github.com/ruzickap/container-build
- https://github.com/step-security-bot/griffon
- https://github.com/tamboliv10/GitCode-Vulnerability-Scanner-OSS---Security-
- https://github.com/thegeeklab/audit-exporter
- https://github.com/vissu99/grype-0.70.0