Vulnerability Details : CVE-2021-3592
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Products affected by CVE-2021-3592
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:a:libslirp_project:libslirp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3592
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 3 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
3.8
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |
2.0
|
1.4
|
NIST |
CWE ids for CVE-2021-3592
-
The product accesses or uses a pointer that has not been initialized.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2021-3592
-
https://security.netapp.com/advisory/ntap-20210805-0004/
July 2021 QEMU Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
[SECURITY] Fedora 34 Update: libslirp-4.4.0-4.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html
[SECURITY] [DLA 3362-1] qemu security update
-
https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html
[SECURITY] [DLA 2753-2] qemu regression updateThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1970484
1970484 – (CVE-2021-3592) CVE-2021-3592 QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp)Issue Tracking;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
[SECURITY] Fedora 33 Update: libslirp-4.3.1-5.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202107-44
libslirp: Multiple vulnerabilities (GLSA 202107-44) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
[SECURITY] [DLA 2753-1] qemu security updateMailing List;Third Party Advisory
Jump to