Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3570

Опубликовано: 05 июл. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.

A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Меры по смягчению последствий

Only attackers that can connect to the ptp4l service can exploit this vulnerability. If ptp4l is bound only to a private network interface, or is protected by firewall rules to block incoming PTP management messages, the attack surface is correspondingly limited. When using the UDP IPv4 or IPv6 network transport, the following tcpdump filter can be used to detect PTP management messages:

(port 319 or port 320) and udp[8]&0xf=0xd

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6linuxptpOut of support scope
Red Hat Enterprise Linux 9linuxptpNot affected
Red Hat Enterprise Linux 7linuxptpFixedRHSA-2021:265806.07.2021
Red Hat Enterprise Linux 8linuxptpFixedRHSA-2021:266006.07.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportlinuxptpFixedRHSA-2021:265906.07.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportlinuxptpFixedRHSA-2021:265706.07.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1966240linuxptp: missing length check of forwarded messages

EPSS

Процентиль: 78%
0.01229
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.

CVSS3: 8.8
nvd
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.

CVSS3: 8.8
debian
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. A missi ...

suse-cvrf
больше 3 лет назад

Security update for linuxptp

suse-cvrf
почти 4 года назад

Security update for linuxptp

EPSS

Процентиль: 78%
0.01229
Низкий

8.8 High

CVSS3