First published: Thu Mar 11 2021(Updated: )
GNOME GLib could allow a remote attacker to bypass security restrictions, caused by a flaw when g_file_replace() function is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink. By persuading a victim to open a specially-crafted ZIP archive, an attacker could exploit this vulnerability to overwrite arbitrary files on the sytem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | <2.66.8 | |
Broadcom Brocade Fabric Operating System Firmware | ||
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
redhat/glib | <2.67.6 | 2.67.6 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28153 is a vulnerability in GNOME GLib that could allow a remote attacker to bypass security restrictions.
CVE-2021-28153 affects IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10.
The severity of CVE-2021-28153 is medium, with a severity value of 5.5.
To fix CVE-2021-28153 in IBM QRadar SIEM, you can apply the relevant patches provided by IBM.
You can find more information about CVE-2021-28153 on the IBM X-Force Exchange and IBM Support pages.