| Vulnerability Name: | CVE-2021-32435 (CCN-222067) | ||||||||||||
| Assigned: | 2021-04-26 | ||||||||||||
| Published: | 2021-04-26 | ||||||||||||
| Updated: | 2022-04-25 | ||||||||||||
| Summary: | Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors. | ||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-32435 Source: XF Type: UNKNOWN abcm2ps-cve202132435-dos(222067) Source: MISC Type: Patch, Third Party Advisory https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/leesavide/abcm2ps/issues/84 Source: CCN Type: abcm2ps GIT Repository stack buffer overflow in function get_key() in parse.c #84 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20220417 [SECURITY] [DLA 2983-1] abcm2ps security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-68d22975a4 Source: FEDORA Type: Issue Tracking, Third Party Advisory FEDORA-2022-93025de981 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-6b46927596 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||