CVE-2021-35942

Severity
9.1CRITICAL
EPSS
1.6%
top 18.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22
Latest updateOct 25

Description

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages3 packages

NVDgnu/glibc< 2.31
Debianglibc< 2.31-13+3

Also affects: Debian Linux 10.0

🔴Vulnerability Details

4
OSV
glibc vulnerabilities2022-10-25
GHSA
GHSA-53wq-r63f-m33q: The wordexp function in the GNU C Library (aka glibc) through 22022-05-24
CVEList
CVE-2021-35942: The wordexp function in the GNU C Library (aka glibc) through 22021-07-22
OSV
CVE-2021-35942: The wordexp function in the GNU C Library (aka glibc) through 22021-07-22

📋Vendor Advisories

5
Ubuntu
GNU C Library vulnerabilities2022-10-25
Ubuntu
GNU C Library vulnerabilities2022-03-01
Microsoft
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted crafted pattern potentially resu2021-07-13
Red Hat
glibc: Arbitrary read in wordexp()2021-06-30
Debian
CVE-2021-35942: glibc - The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or ...2021