A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.
CVE-2021-3466 - Critical Severity Vulnerability
Vulnerable Library - libmicrohttpdlibmicrohttpd-0.9.66
Gnu Distributions
Library home page: https://ftp.gnu.org/gnu/libmicrohttpd?wsslib=libmicrohttpd
Found in base branch: main
Vulnerable Source Files (1)
/edrav2/eprj/libmicrohttpd/src/microhttpd/postprocessor.c
Vulnerability Details
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.
Publish Date: 2021-03-25
URL: CVE-2021-3466
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3466
Release Date: 2021-03-25
Fix Resolution: 0.9.71