First published: Thu Jan 13 2022(Updated: )
An out-of-bounds read vulnerability exists due to a boundary error when reading SONMP packets. A remote user can send specially crafted packets to the application, trigger a heap-based buffer overflow read and leak memory values from lldpd application or crash it. Reference: <a href="https://www.cybersecurity-help.cz/vdb/SB2021111808">https://www.cybersecurity-help.cz/vdb/SB2021111808</a> <a href="https://github.com/lldpd/lldpd/commit/73d42680fce8598324364dbb31b9bc3b8320adf7">https://github.com/lldpd/lldpd/commit/73d42680fce8598324364dbb31b9bc3b8320adf7</a> <a href="https://lldpd.github.io/security.html">https://lldpd.github.io/security.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lldpd Project Lldpd | <1.0.13 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
redhat/lldpd | <1.0.13 | 1.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43612 is a vulnerability in lldpd before version 1.0.13 that allows an out-of-bounds heap read via short SONMP packets.
CVE-2021-43612 has a severity rating of 7.5 (High).
LLDPD versions up to but excluding 1.0.13 are affected by CVE-2021-43612, as well as Fedora 36, 37, and 38.
To fix CVE-2021-43612, update lldpd to version 1.0.13 or later. For Fedora, check for updates to the operating system.
Yes, you can find additional information about CVE-2021-43612 in the references provided: [Github Commit](https://github.com/lldpd/lldpd/commit/73d42680fce8598324364dbb31b9bc3b8320adf7), [Github Comparison](https://github.com/lldpd/lldpd/compare/1.0.12...1.0.13), [Fedora Security Announcement](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/).