First published: Fri Nov 19 2021(Updated: )
An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gerbv | =2.7.0 | |
Gerbv | =2.7.0-dev | |
Gerbv | =2.7.0-forked_dev | |
Debian | =9.0 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40391 has a high severity rating due to its potential to allow code execution through specially-crafted drill files.
To fix CVE-2021-40391, you should update to the latest version of Gerbv that addresses this vulnerability.
CVE-2021-40391 affects Gerbv version 2.7.0, its development version, and forked versions of the same release.
Yes, CVE-2021-40391 can be exploited remotely by an attacker providing a malicious drill file.
CVE-2021-40391 is classified as an out-of-bounds write vulnerability.