First published: Wed Sep 08 2021(Updated: )
A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
Linux Linux kernel | <5.14 | |
Linux Linux kernel | >=5.15<5.15.15 | |
Fedoraproject Fedora | =34 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3773 is a vulnerability in netfilter that allows an attacker to infer openvpn connection endpoint information.
CVE-2021-3773 has a severity rating of 9.8, which is classified as critical.
The affected software versions include kernel 5.15.15, kernel-rt 4.18.0-372.9.1.rt7.166.el8, kernel 4.18.0-372.9.1.el8, Linux kernel up to version 5.14, Fedora 34, Redhat Enterprise Linux 6.0, 7.0, and 8.0, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Network Exposure Function 22.1.1, and Oracle Communications Cloud Native Core Policy 22.2.0.
An attacker can exploit CVE-2021-3773 to infer openvpn connection endpoint information and use it for further network attacks.
Yes, you can find references for CVE-2021-3773 at the following links: [link1](https://www.openwall.com/lists/oss-security/2021/09/08/3), [link2](https://breakpointingbad.com/2021/09/08/Port-Shadows-via-Network-Alchemy.html), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2006005).