Vulnerability Name: | CVE-2021-3121 (CCN-194539) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-01-10 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-01-10 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-04-01 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.6 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) 7.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-129 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3121 Source: MISC Type: Third Party Advisory https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependency/29025 Source: XF Type: UNKNOWN gogoprotobuf-cve20213121-unspecified(194539) Source: CCN Type: Protobuf GIT Repository skippy peanut butter Source: MISC Type: Patch, Third Party Advisory https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc Source: MISC Type: Patch, Third Party Advisory https://github.com/gogo/protobuf/compare/v1.3.1...v1.3.2 Source: MLIST Type: Mailing List, Third Party Advisory [skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210121 [GitHub] [pulsar-client-go] hrsakai opened a new pull request #446: Upgrade gogo/protobuf to 1.3.2 Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210122 [GitHub] [pulsar-client-go] hrsakai opened a new pull request #446: Upgrade gogo/protobuf to 1.3.2 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210219-0006/ Source: CCN Type: IBM Security Bulletin 6469135 (Security Guardium Insights) IBM Security Guardium Insights is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6486119 (Cloud Private) IBM Cloud Private is vulnerable to a Go vulnerability (CVE-2021-3121) Source: CCN Type: IBM Security Bulletin 6599703 (Db2 On Openshift) Multiple vulnerabilities affect IBM Db2 On Openshift and IBM Db2 and Db2 Warehouse on Cloud Pak for Data Source: CCN Type: IBM Security Bulletin 6614451 (Robotic Process Automation for Cloud Pak) Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak Source: CCN Type: IBM Security Bulletin 6833272 (CICS TX Standard) IBM CICS TX Standard is vulnerable to multiple vulnerabilities in Kubernetes. Source: CCN Type: IBM Security Bulletin 6833274 (CICS TX Advanced) IBM CICS TX Advanced is vulnerable to multiple vulnerabilities in Kubernetes. Source: CCN Type: IBM Security Bulletin 6837291 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container operator may be vulnerable to CVE-2021-3121 Source: CCN Type: IBM Security Bulletin 6848225 (Netcool Operations Insight) Netcool Operations Insight v1.6.7 contains fixes for multiple security vulnerabilities. Source: CCN Type: IBM Security Bulletin 6999559 (Edge Application Manager) IBM Edge Application Manager 4.5 addresses multiple security vulnerabilities Source: CCN Type: IBM Security Bulletin 7002503 (Cloud Pak for Security) IBM Cloud Pak for Security includes components with multiple known vulnerabilities Source: CCN Type: IBM Security Bulletin 7007837 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |