Vulnerability Details : CVE-2021-4217
Potential exploit
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-4217
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:a:unzip_project:unzip:6.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-4217
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-4217
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
1.8
|
1.4
|
NIST |
CWE ids for CVE-2021-4217
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2021-4217
-
https://access.redhat.com/security/cve/CVE-2021-4217
CVE-2021-4217- Red Hat Customer PortalThird Party Advisory
-
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
Bug #1957077 “SIGSEGV during processing of unicode string” : Bugs : unzip package : UbuntuExploit;Issue Tracking;Patch;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2044583
2044583 – (CVE-2021-4217) CVE-2021-4217 unzip: Null pointer dereference in Unicode strings codeExploit;Issue Tracking;Third Party Advisory
Jump to