Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-3999


A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.


Published

2022-08-24T16:15:09.077

Last Modified

2024-11-21T06:23:20.937

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-193
  • Type: Secondary
    CWE-193

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu glibc < 2.31 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes
Operating System debian debian_linux 10.0 Yes
Application netapp e-series_performance_analyzer - Yes
Application netapp nfs_plug-in * Yes
Application netapp ontap_select_deploy_administration_utility - Yes
Operating System netapp h300s_firmware - Yes
Hardware netapp h300s - No
Operating System netapp h500s_firmware - Yes
Hardware netapp h500s - No
Operating System netapp h700s_firmware - Yes
Hardware netapp h700s - No
Operating System netapp h410s_firmware - Yes
Hardware netapp h410s - No
Operating System netapp h410c_firmware - Yes
Hardware netapp h410c - No

References