CVE-2021-3466

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3466
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3466.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-3466
Published
2021-03-25T19:15:15Z
Modified
2024-11-21T06:21:36Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in libmicrohttpd. A missing bounds check in the postprocessurlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.

References

Affected packages

Debian:11 / libmicrohttpd

Package

Name
libmicrohttpd
Purl
pkg:deb/debian/libmicrohttpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.71-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libmicrohttpd

Package

Name
libmicrohttpd
Purl
pkg:deb/debian/libmicrohttpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.71-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libmicrohttpd

Package

Name
libmicrohttpd
Purl
pkg:deb/debian/libmicrohttpd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.71-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}