First published: Tue May 18 2021(Updated: )
Libsolv is vulnerable to a denial of service, caused by a buffer overflow in the testcase_read function. By persuading a victim to open a specially file, a remote attacker could overflow a buffer and cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Libsolv | <0.7.17 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
redhat/libsolv | <0.7.17 | 0.7.17 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3200.
The title of the vulnerability is 'Libsolv is vulnerable to a denial of service caused by a buffer overflow in the testcase_read function.'
The severity of CVE-2021-3200 is low with a CVSS score of 3.3.
Libsolv version 0.7.17 and IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10 are affected by CVE-2021-3200.
Update Libsolv to version 0.7.17.
Apply the patch available at: https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=All&platform=Linux&function=fixId&fixids=7.5.0-QRADAR-QRSIEM-20220215133427&includeRequisites=1&includeSupersedes=0&downloadMethod=http&login=true
Apply the patch available at: https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=All&platform=Linux&function=fixId&fixids=7.4.3-QRADAR-QRSIEM-20220307203834&includeRequisites=1&includeSupersedes=0&downloadMethod=http
Apply the patch available at: https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+Vulnerability+Manager&release=All&platform=All&function=fixId&fixids=7.3.3-QRADAR-QRSIEM-20220318161607&includeRequisites=1&includeSupersedes=0&downloadMethod=http&source=SAR
The CWE ID associated with CVE-2021-3200 is CWE-119.
You can find more information about CVE-2021-3200 at the following references: [github.com/openSUSE/libsolv/issues/416](https://github.com/openSUSE/libsolv/issues/416), [bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1962308](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1962308), [github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec](https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec).