CWE
416
Advisory Published
CVE Published
Updated

CVE-2021-20232: Use After Free

First published: Fri Jan 29 2021(Updated: )

GnuTLS is vulnerable to a denial of service, caused by a use-after-free issue in client_send_params in lib/ext/pre_shared_key.c. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause memory corruption and other consequences.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
IBM QRadar SIEM<=7.5.0 GA
IBM QRadar SIEM<=7.4.3 GA - 7.4.3 FP4
IBM QRadar SIEM<=7.3.3 GA - 7.3.3 FP10
redhat/gnutls<3.7.1
3.7.1
GNU GnuTLS>=3.6.3<3.7.1
Redhat Enterprise Linux=8.0
Fedoraproject Fedora=34

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2021-20232?

    CVE-2021-20232 is a vulnerability in GnuTLS that could allow an attacker to cause a denial of service by exploiting a use-after-free issue in client_send_params in lib/ext/pre_shared_key.c.

  • How does CVE-2021-20232 impact GnuTLS?

    CVE-2021-20232 could lead to memory corruption and other consequences, potentially resulting in a denial of service.

  • What is the severity of CVE-2021-20232?

    CVE-2021-20232 has a severity rating of 7.4, which is considered high.

  • How can I fix CVE-2021-20232 in IBM QRadar SIEM version 7.5.0 GA?

    To fix CVE-2021-20232 in IBM QRadar SIEM version 7.5.0 GA, you should apply the patch available at the following URL: [Patch URL]

  • How can I fix CVE-2021-20232 in IBM QRadar SIEM version 7.4.3 GA - 7.4.3 FP4?

    To fix CVE-2021-20232 in IBM QRadar SIEM version 7.4.3 GA - 7.4.3 FP4, you should apply the patch available at the following URL: [Patch URL]

  • How can I fix CVE-2021-20232 in IBM QRadar SIEM version 7.3.3 GA - 7.3.3 FP10?

    To fix CVE-2021-20232 in IBM QRadar SIEM version 7.3.3 GA - 7.3.3 FP10, you should apply the patch available at the following URL: [Patch URL]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203