CVE-2021-41253
CVSS V2 Medium 6.8
CVSS V3 High 8.1
Description
Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.
Overview
- CVE ID
- CVE-2021-41253
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-11-08T22:15:16
- Last Modified Date
- 2022-10-24T16:07:22
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:zyantific:zydis:*:*:*:*:*:*:*:* | 1 | OR | 3.2.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://huntr.dev/bounties/96b0a482-7041-45b1-9327-c6a4a8f32d3a | Exploit Third Party Advisory |
https://github.com/zyantific/zydis/commit/55dd08c210722aed81b38132f5fd4a04ec1943b5 | Patch Third Party Advisory |
https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784 | Exploit Patch Third Party Advisory |
https://github.com/zyantific/zydis/security/advisories/GHSA-q42v-hv86-3m4g | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-41253 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41253 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:47:23 | Added to TrackCVE | |||
2022-12-05 14:06:10 | 2021-11-08T22:15Z | 2021-11-08T22:15:16 | CVE Published Date | updated |
2022-12-05 14:06:10 | 2022-10-24T16:07:22 | CVE Modified Date | updated | |
2022-12-05 14:06:10 | Analyzed | Vulnerability Status | updated |