CVE-2021-43396

Related Vulnerabilities: CVE-2021-43396  

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases.

Description

The MITRE CVE dictionary describes this issue as:

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases.

Additional Information

  • Bugzilla 2020652: CVE-2021-43396 glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
  • CWE-20: Improper Input Validation
  • FAQ: Frequently asked questions about CVE-2021-43396