Vulnerability Name: | CVE-2021-41495 (CCN-215808) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-05-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-05-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-07-28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | ** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. Note: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-41495 Source: XF Type: UNKNOWN numpy-cve202141495-dos(215808) Source: CCN Type: NumPy GIT Repository Missing return-value validation of the function PyArray_DescrNew #19038 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/numpy/numpy/issues/19038 Source: CCN Type: NumPy Web site NumPy Source: CCN Type: IBM Security Bulletin 6564599 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in NumPy Source: N/A Type: Third Party Advisory N/A | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |