Vulnerability Details : CVE-2021-3581
Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5
Vulnerability category: Input validation
Products affected by CVE-2021-3581
- cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3581
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3581
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:P |
6.5
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
7.0
|
HIGH | CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
0.4
|
6.0
|
Zephyr Project |
CWE ids for CVE-2021-3581
-
The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.Assigned by: vulnerabilities@zephyrproject.org (Secondary)
-
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-3581
-
http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5
Buffer Access with Incorrect Length Value in zephyr · Advisory · zephyrproject-rtos/zephyr · GitHubPatch;Vendor Advisory
Jump to