← Voltar para CVEs
CVE-2021-3592
LOW3.8
Descricao
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Detalhes CVE
Pontuacao CVSS v3.13.8
SeveridadeLOW
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado6/15/2021
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxfedoraproject:fedoralibslirp_project:libslirpredhat:enterprise_linux
Fraquezas (CWE)
CWE-824CWE-824
Referencias
https://bugzilla.redhat.com/show_bug.cgi?id=1970484(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/(secalert@redhat.com)
https://security.gentoo.org/glsa/202107-44(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20210805-0004/(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1970484(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202107-44(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210805-0004/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.