A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBDOPTSTRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
{
"versions": [
{
"introduced": "1.11.8"
},
{
"fixed": "1.24.6"
},
{
"introduced": "1.25.1"
},
{
"fixed": "1.26.5"
},
{
"introduced": "1.27.1"
},
{
"fixed": "1.27.6"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}
]
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2021-3716-07c259cd",
"target": {
"file": "server/protocol-handshake-newstyle.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"17736055569549823576078601167558441071",
"252569956524523289579052347941166243611",
"297470718666234456831894338929195417055"
]
},
"signature_version": "v1",
"source": "https://gitlab.com/nbdkit/nbdkit@09a13dafb7bb3a38ab52eb5501cba786365ba7fd"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2021-3716-72881b3f",
"target": {
"file": "server/protocol-handshake-newstyle.c",
"function": "negotiate_handshake_newstyle_options"
},
"digest": {
"length": 9714.0,
"function_hash": "278656485481587851966178619826305884851"
},
"signature_version": "v1",
"source": "https://gitlab.com/nbdkit/nbdkit@09a13dafb7bb3a38ab52eb5501cba786365ba7fd"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3716.json"