First published: Fri Jan 29 2021(Updated: )
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG Libgcrypt | =1.9.0 | |
Oracle Communications Billing and Revenue Management | =12.0.0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value.
The severity of CVE-2021-3345 is high (7.8).
Libgcrypt version 1.9.0 and Oracle Communications Billing and Revenue Management version 12.0.0.3.0 are affected by CVE-2021-3345.
It is recommended to upgrade to Libgcrypt version 1.9.1 or later to fix CVE-2021-3345.
You can find more information about CVE-2021-3345 at the following references: [link1], [link2], [link3].