Lucene search

K
nvd[email protected]NVD:CVE-2021-3716
HistoryMar 02, 2022 - 11:15 p.m.

CVE-2021-3716

2022-03-0223:15:09
CWE-924
web.nvd.nist.gov
5
nbdkit
plaintext caching
starttls
mitm attacker
nbd_opt_structured_reply
system availability

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

42.9%

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

Affected configurations

Nvd
Node
nbdkit_projectnbdkitRange1.11.81.24.6
OR
nbdkit_projectnbdkitRange1.25.11.26.5
OR
nbdkit_projectnbdkitRange1.27.11.27.6
Node
redhatenterprise_linuxMatch8.0-
OR
redhatenterprise_linuxMatch8.0advanced_virtualization

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

42.9%