First published: Tue Aug 17 2021(Updated: )
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nbdkit Project Nbdkit | >=1.11.8<1.24.6 | |
Nbdkit Project Nbdkit | >=1.25.1<1.26.5 | |
Nbdkit Project Nbdkit | >=1.27.1<1.27.6 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3716 is a vulnerability found in nbdkit that allows a MitM attacker to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying client requests to the server.
CVE-2021-3716 affects nbdkit by improperly caching plaintext state across the STARTTLS encryption boundary, leading to potential termination of client connections.
CVE-2021-3716 has a severity rating of 3.1 (low).
To fix CVE-2021-3716, upgrade nbdkit to version 1.24.6 or higher.
You can find more information about CVE-2021-3716 at the following references: [link1], [link2], [link3].