CVE-2021-3999

7.8HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
24 August 2022

Summary

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

Affected Version(s)

glibc Fixed in glibc v2.31 and above.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
πŸͺ This website uses cookies, like every other website on the internet πŸ˜• By using our website, you consent to the use of cookies.