Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3826

Опубликовано: 22 сент. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.

Отчет

Libiberty is a component used during compilation. This vulnerability requires a corrupted input file to have already been introduced into your application’s source code. This flaw could then induce a segmentation fault during compile time. However, it would be immediately apparent to the developer or operations team that something is wrong. In a release pipeline which utilizes libiberty, a build failure would not prevent usage of existing stable builds, so while a flaw of this type could halt the roll out of new versions of your app, it cannot impact any apps which have already been built and deployed. If this vulnerability were exploited, organizations which follow basic industry guidance for development and security (isolation of build environment, use of version control, and restriction of commit access) would be able to recover easily. Better prepared organizations would not even experience an outage as any problematic commits would be automatically reverted. For these reasons Red Hat Product Security has rated the impact as Low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6binutilsOut of support scope
Red Hat Enterprise Linux 6compat-gcc-295Out of support scope
Red Hat Enterprise Linux 6compat-gcc-296Out of support scope
Red Hat Enterprise Linux 6compat-gcc-32Out of support scope
Red Hat Enterprise Linux 6compat-gcc-34Out of support scope
Red Hat Enterprise Linux 6gccOut of support scope
Red Hat Enterprise Linux 7binutilsOut of support scope
Red Hat Enterprise Linux 7compat-gcc-32Out of support scope
Red Hat Enterprise Linux 7compat-gcc-34Out of support scope
Red Hat Enterprise Linux 7compat-gcc-44Out of support scope

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2122627libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c

EPSS

Процентиль: 58%
0.00368
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 6.5
nvd
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVSS3: 6.5
debian
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c ...

CVSS3: 7.5
github
около 3 лет назад

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

oracle-oval
почти 2 года назад

ELSA-2023-6372: gdb security update (LOW)

EPSS

Процентиль: 58%
0.00368
Низкий

7.5 High

CVSS3