8.1
CVE-2021-22901
- EPSS 0.34%
- Veröffentlicht 11.06.2021 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:50:52
- Quelle support@hackerone.com
- Teams Watchlist Login
- Unerledigt Login
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Oracle ≫ Communications Cloud Native Core Binding Support Function Version1.11.0
Oracle ≫ Communications Cloud Native Core Network Repository Function Version1.15.0
Oracle ≫ Communications Cloud Native Core Network Repository Function Version1.15.1
Oracle ≫ Communications Cloud Native Core Service Communication Proxy Version1.15.0
Oracle ≫ Mysql Server Version <= 5.7.34
Oracle ≫ Mysql Server Version >= 8.0.0 <= 8.0.25
Netapp ≫ Active Iq Unified Manager Version- SwPlatformvsphere
Netapp ≫ Active Iq Unified Manager Version- SwPlatformwindows
Netapp ≫ Cloud Backup Version-
Netapp ≫ Oncommand Insight Version-
Netapp ≫ Oncommand Workflow Automation Version-
Netapp ≫ Snapcenter Version-
Netapp ≫ Solidfire & Hci Management Node Version-
Netapp ≫ Hci Compute Node Firmware Version-
Netapp ≫ H300e Firmware Version-
Netapp ≫ H300s Firmware Version-
Netapp ≫ H410s Firmware Version-
Netapp ≫ H500e Firmware Version-
Netapp ≫ H500s Firmware Version-
Netapp ≫ H700e Firmware Version-
Netapp ≫ H700s Firmware Version-
Siemens ≫ Sinec Infrastructure Network Services Version < 1.0.1.1
Splunk ≫ Universal Forwarder Version >= 8.2.0 < 8.2.12
Splunk ≫ Universal Forwarder Version >= 9.0.0 < 9.0.6
Splunk ≫ Universal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.34% | 0.564 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.