// For flags

CVE-2021-43790

Use After Free in lucet

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Lucet is a native WebAssembly compiler and runtime. There is a bug in the main branch of `lucet-runtime` affecting all versions published to crates.io that allows a use-after-free in an Instance object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the Instance objects, it is possible to trigger a use-after-free when the Instance is dropped. Users should upgrade to the main branch of the Lucet repository. Lucet no longer provides versioned releases on crates.io. There is no way to remediate this vulnerability without upgrading.

Lucet es un compilador y runtime nativo de WebAssembly. Se presenta un error en la rama principal de "lucet-runtime" que afecta a todas las versiones publicadas en crates.io y que permite un uso de memoria previamente liberada en un objeto Instance que podría resultar en corrupción de memoria, carrera de datos u otros problemas relacionados. Este bug fue introducido al principio del desarrollo de Lucet y está presente en todas las versiones. Como resultado de este error, y dependiendo del respaldo de memoria para los objetos de Instancia, es posible desencadenar un uso de memoria previamente liberada cuando la Instancia es abandonada. Los usuarios deben actualizar a la rama principal del repositorio de Lucet. Lucet ya no proporciona versiones en crates.io. No se presenta manera de remediar esta vulnerabilidad sin actualizar

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-16 CVE Reserved
  • 2021-11-29 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-08-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bytecodealliance
Search vendor "Bytecodealliance"
Lucet
Search vendor "Bytecodealliance" for product "Lucet"
<= 0.6.1
Search vendor "Bytecodealliance" for product "Lucet" and version " <= 0.6.1"
rust
Affected