Vulnerability Name: | CVE-2021-3466 (CCN-198808) | ||||||||||||
Assigned: | 2021-03-23 | ||||||||||||
Published: | 2021-03-23 | ||||||||||||
Updated: | 2021-12-15 | ||||||||||||
Summary: | A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3466 Source: CCN Type: Red Hat Bugzilla Bug 1939127 (CVE-2021-3466) - CVE-2021-3466 libmicrohttpd: Buffer overflow issue in URL parser in the post_process_urlencoded function Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1939127 Source: XF Type: UNKNOWN libmicrohttpd-cve20213466-bo(198808) Source: CCN Type: libmicrohttpd GIT Repository first experimental rewrite of URL postprocessor, still fails, not production ready Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-6d5578e756 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-5e10ad8c19 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-d4149ff7fb Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-3466 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||
BACK |