First published: Fri Feb 17 2023(Updated: )
** DISPUTED ** Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <=3003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33226 is a Buffer Overflow vulnerability in Saltstack v.3003 and before that allows an attacker to execute arbitrary code.
An attacker can exploit CVE-2021-33226 by exploiting the buffer overflow vulnerability in the 'func' variable in the salt/salt/modules/status.py file.
CVE-2021-33226 has a severity rating of 9.8 (critical).
Yes, CVE-2021-33226 is disputed by third parties because an attacker cannot influence the eval input.
Yes, you can find references for CVE-2021-33226 at the following links: - [Bugzilla](https://bugzilla.suse.com/show_bug.cgi?id=1208473) - [GitHub](https://github.com/saltstack/salt/blob/master/salt/modules/status.py)