Логотип exploitDog
bind:CVE-2021-3716
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-3716

Количество 7

Количество 7

ubuntu логотип

CVE-2021-3716

больше 3 лет назад

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
EPSS: Низкий
redhat логотип

CVE-2021-3716

почти 4 года назад

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.5
EPSS: Низкий
nvd логотип

CVE-2021-3716

больше 3 лет назад

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2021-3716

больше 3 лет назад

A flaw was found in nbdkit due to to improperly caching plaintext stat ...

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-3vpg-mwgf-4jvj

больше 3 лет назад

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
EPSS: Низкий
rocky логотип

RLSA-2022:1759

около 3 лет назад

Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1759

около 3 лет назад

ELSA-2022-1759: virt:ol and virt-devel:ol security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-3716

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3716

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3716

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3716

A flaw was found in nbdkit due to to improperly caching plaintext stat ...

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-3vpg-mwgf-4jvj

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2022:1759

Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

около 3 лет назад
oracle-oval логотип
ELSA-2022-1759

ELSA-2022-1759: virt:ol and virt-devel:ol security, bug fix, and enhancement update (MODERATE)

около 3 лет назад

Уязвимостей на страницу