First published: Fri Jan 29 2021(Updated: )
GnuTLS is vulnerable to a denial of service, caused by a use-after-free issue in client sending key_share extension. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause memory corruption and other consequences.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
redhat/gnutls | <3.7.1 | 3.7.1 |
GNU GnuTLS | >=3.6.3<3.7.1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp E-series Performance Analyzer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20231 is a vulnerability in GnuTLS that allows for a denial of service attack by exploiting a use-after-free issue in client sending key_share extension.
By exploiting CVE-2021-20231, an attacker can cause memory corruption and other consequences, leading to a denial of service.
IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10 are affected by CVE-2021-20231.
CVE-2021-20231 has a severity rating of 7.4, which is considered high.
To fix CVE-2021-20231, you should apply the relevant patches provided by IBM for the affected versions of QRadar SIEM.