CVE-2021-20294
Gentoo Linux Security Advisory 202208-30
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
Se encontró un fallo en el programa binutils readelf versión 2.35. Un atacante que sea capaz de convencer a una víctima usando readelf para que lea un archivo diseñado podría desencadenar un desbordamiento de búfer de la pila, una escritura fuera de límites de los datos arbitrarios proporcionados por el atacante. El mayor impacto de este fallo es la confidencialidad, integridad y disponibilidad
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. Versions less than 2.38 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-17 CVE Reserved
- 2021-04-29 CVE Published
- 2023-01-21 First Exploit
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Date | SRC |
---|---|---|
https://github.com/tin-z/CVE-2021-20294-POC | 2023-01-21 | |
https://sourceware.org/bugzilla/show_bug.cgi?id=26929 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202208-30 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Binutils Search vendor "Gnu" for product "Binutils" | >= 2.35 < 2.35.2 Search vendor "Gnu" for product "Binutils" and version " >= 2.35 < 2.35.2" | - |
Affected
|