CVE-2021-36159
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\0' terminator one byte too late.
libfetch versiones anteriores al 26-07-2021, como se usa en apk-tools, xbps, y otros productos, maneja inapropiadamente las cadenas numéricas para los protocolos FTP y HTTP. La implementación del modo pasivo de FTP permite una lectura fuera de límites porque strtol se usa para analizar los números relevantes en bytes de dirección. No comprueba si la línea termina prematuramente. Si lo hace, la condición para bucle comprueba el terminador "\0" un byte demasiado tarde
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-07-05 CVE Reserved
- 2021-08-03 CVE Published
- 2024-04-18 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (6)
URL | Date | SRC |
---|---|---|
https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch | 2023-11-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freebsd Search vendor "Freebsd" | Libfetch Search vendor "Freebsd" for product "Libfetch" | < 2021-07-26 Search vendor "Freebsd" for product "Libfetch" and version " < 2021-07-26" | - |
Affected
|