← Volver a CVEs
CVE-2021-3592
LOW3.8
Descripcion
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Detalles CVE
Puntuacion CVSS v3.13.8
SeveridadLOW
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/15/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxfedoraproject:fedoralibslirp_project:libslirpredhat:enterprise_linux
Debilidades (CWE)
CWE-824CWE-824
Referencias
https://bugzilla.redhat.com/show_bug.cgi?id=1970484(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/(secalert@redhat.com)
https://security.gentoo.org/glsa/202107-44(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20210805-0004/(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1970484(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202107-44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210805-0004/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.