First published: Fri Aug 13 2021(Updated: )
Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strlen to determine the ending location of the char* passed in by the user, no checks are done to see if the passed in char* is longer than the staticly sized buffer data is memcpy‘d into, but after the memcpy a null byte is written to what is assumed to be the end of the buffer to terminate the char*, but without length checks, this null write occurs at an arbitrary offset from the buffer. An attacker can provide malicious input to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Att Xmill | =0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-21814.
The severity of CVE-2021-21814 is high.
The software affected by CVE-2021-21814 is Att Xmill version 0.7.
CVE-2021-21814 is a vulnerability within the function HandleFileArg, where the argument filepattern, passed in by the user from the command line, is not properly checked for length, allowing potential buffer overflow.
To fix CVE-2021-21814, a patch or update should be applied to the Att Xmill software to properly validate and limit the length of the filepattern argument passed in by the user.