Vulnerability Details : CVE-2021-3595
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Products affected by CVE-2021-3595
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:a:libslirp_project:libslirp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3595
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3595
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
3.8
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N |
2.0
|
1.4
|
NIST |
CWE ids for CVE-2021-3595
-
The product accesses or uses a pointer that has not been initialized.Assigned by: secalert@redhat.com (Primary)
References for CVE-2021-3595
-
https://bugzilla.redhat.com/show_bug.cgi?id=1970489
1970489 – (CVE-2021-3595) CVE-2021-3595 QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp)Issue Tracking;Patch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20210805-0004/
July 2021 QEMU Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
[SECURITY] Fedora 34 Update: libslirp-4.4.0-4.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/03/msg00013.html
[SECURITY] [DLA 3362-1] qemu security update
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
[SECURITY] Fedora 33 Update: libslirp-4.3.1-5.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202107-44
libslirp: Multiple vulnerabilities (GLSA 202107-44) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
[SECURITY] [DLA 2753-1] qemu security updateMailing List;Third Party Advisory
Jump to