10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.8%
sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an
out-of-bounds read (in the core interpreter) that can lead to Code
Execution. If a victim executes an attacker-controlled squirrel script, it
is possible for the attacker to break out of the squirrel script sandbox
even if all dangerous functionality such as File System functions has been
disabled. An attacker might abuse this bug to target (for example) Cloud
services that allow customization via SquirrelScripts, or distribute
malware through video games that embed a Squirrel Engine.
www.squirrel-lang.org/#download
blog.sonarsource.com/squirrel-vm-sandbox-escape/
github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98
launchpad.net/bugs/cve/CVE-2021-41556
nvd.nist.gov/vuln/detail/CVE-2021-41556
security-tracker.debian.org/tracker/CVE-2021-41556
www.cve.org/CVERecord?id=CVE-2021-41556
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.8%