GLSA-202311-08 : GNU Libmicrohttpd: Buffer Overflow Vulnerability

critical Nessus Plugin ID 186295

Description

The remote host is affected by the vulnerability described in GLSA-202311-08 (GNU Libmicrohttpd: Buffer Overflow Vulnerability)

- A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable. (CVE-2021-3466)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

All GNU Libmicrohttpd users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose >net-libs/libmicrohttpd-0.9.70

See Also

https://security.gentoo.org/glsa/202311-08

https://bugs.gentoo.org/show_bug.cgi?id=778296

Plugin Details

Severity: Critical

ID: 186295

File Name: gentoo_GLSA-202311-08.nasl

Version: 1.0

Type: local

Published: 11/27/2023

Updated: 11/27/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-3466

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:libmicrohttpd, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/25/2023

Vulnerability Publication Date: 3/25/2021

Reference Information

CVE: CVE-2021-3466