Vulnerability CVE-2021-42341


Published: 2021-10-14

Description:
checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.

Type:

NVD-CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Openrc project -> Openrc 

 References:
https://github.com/OpenRC/openrc/issues/459
https://github.com/OpenRC/openrc/commit/bb8334104baf4d5a4a442a8647fb9204738f2204
https://bugs.gentoo.org/816900
https://github.com/OpenRC/openrc/pull/462
https://github.com/OpenRC/openrc/commit/63db2d99e730547339d1bdd28e8437999c380cae
https://github.com/OpenRC/openrc/issues/418

Copyright 2024, cxsecurity.com

 

Back to Top