Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3420
HistoryMar 05, 2021 - 12:00 a.m.

CVE-2021-3420

2021-03-0500:00:00
ubuntu.com
ubuntu.com
9

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.5%

A flaw was found in newlib in versions prior to 4.0.0. Improper overflow
validation in the memory allocation functions mEMALIGn, pvALLOc,
nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow,
leading to an allocation of a small buffer and then to a heap-based buffer
overflow.

Notes

Author Note
eslerm fixed for newlib-4.0.0 on 2020-11-17 with aa106b29a (“malloc/nano-malloc: correctly check for out-of-bounds allocation reqs”)

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.5%