CVE-2021-41496
numpy: buffer overflow in the array_from_pyobj() in fortranobject.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally)
** EN DISPUTA ** Un desbordamiento de búfer en la función array_from_pyobj del archivo fortranobject.c en NumPy versiones anteriores a 1.19, que permite a atacantes realizar un ataque de denegación de servicio al construir cuidadosamente un array con valores negativos. NOTA: El proveedor no está de acuerdo en que esto sea una vulnerabilidad; las dimensiones negativas sólo pueden ser creadas por un usuario ya privilegiado (o internamente)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-20 CVE Reserved
- 2021-12-17 CVE Published
- 2023-07-10 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/numpy/numpy/issues/19000 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-41496 | 2022-03-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2035040 | 2022-03-23 |