Vulnerability Name: | CVE-2021-29630 (CCN-208609) | ||||||||||||
Assigned: | 2021-08-24 | ||||||||||||
Published: | 2021-08-24 | ||||||||||||
Updated: | 2021-12-14 | ||||||||||||
Summary: | In FreeBSD 13.0-STABLE before n246938-0729ba2f49c9, 12.2-STABLE before r370383, 11.4-STABLE before r370381, 13.0-RELEASE before p4, 12.2-RELEASE before p10, and 11.4-RELEASE before p13, the ggatec daemon does not validate the size of a response before writing it to a fixed-sized buffer allowing a malicious attacker in a privileged network position to overwrite the stack of ggatec and potentially execute arbitrary code. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29630 Source: XF Type: UNKNOWN freebsd-cve202129630-code-exec(208609) Source: MISC Type: Patch, Vendor Advisory https://security.FreeBSD.org/advisories/FreeBSD-SA-21:14.ggatec.asc Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210923-0005/ Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-21:14.ggatec Remote code execution in ggatec(8) Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-29630 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |