Vulnerability Details : CVE-2021-36080
Potential exploit
GNU LibreDWG 0.12.3.4163 through 0.12.3.4191 has a double-free in bit_chain_free (called from dwg_encode_MTEXT and dwg_encode_add_object).
Vulnerability category: Memory Corruption
Products affected by CVE-2021-36080
- cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-36080
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-36080
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-36080
-
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-36080
-
https://github.com/LibreDWG/libredwg/commit/9b6e0ff9ef02818df034fc42c3bd149a5ff89342
encode: avoid hdl_dat double-free · LibreDWG/libredwg@9b6e0ff · GitHubPatch;Third Party Advisory
-
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31724
31724 - libredwg:llvmfuzz: Heap-double-free in bit_chain_free - oss-fuzzExploit;Issue Tracking;Patch;Third Party Advisory
-
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libredwg/OSV-2021-495.yaml
oss-fuzz-vulns/OSV-2021-495.yaml at main · google/oss-fuzz-vulns · GitHubThird Party Advisory
Jump to