First published: Mon Mar 29 2021(Updated: )
The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
net\ \ | <2.0000 | |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29424 is classified as a medium severity vulnerability.
To remediate CVE-2021-29424, update the Net::Netmask module to version 2.0000 or later.
CVE-2021-29424 affects all versions of the Net::Netmask module before 2.0000.
CVE-2021-29424 allows attackers to bypass IP address-based access controls due to improper handling of extraneous zero characters.
CVE-2021-29424 impacts systems using the affected versions of the Net::Netmask module on Fedora versions 32, 33, and 34.