7.8
CVSSv3

CVE-2021-3345

Published: 29/01/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnupg libgcrypt 1.9.0

oracle communications billing and revenue management 12.0.0.3.0

Vendor Advisories

Debian Bug report logs - #981370 libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental) Package: libgcrypt20; Maintainer for libgcrypt20 is Debian GnuTLS Maintainers <pkg-gnutls-maint@listsaliothdebianorg>; Source for libgcrypt20 is src:libgcrypt20 (PTS, buildd, popcon) ...
_gcry_md_block_write in cipher/hash-commonc in libgcrypt version 190 has a heap-based buffer overflow when the digest final function sets a large count value Just decrypting some data can overflow a heap buffer with attacker controlled data, no verification or signature is validated before the vulnerability occurs The issue is fixed in version ...

Github Repositories

POC exploit of CVE-2021-3345, a vulnerability in libgcrypt version 1.9.0

CVE-2021-3345 How to build vulnerable libgcrypt git clone --single-branch --branch LIBGCRYPT-19-BRANCH devgnupgorg/source/libgcryptgit cd libgcrypt git checkout aa3f595341eb /autogensh /configure --enable-maintainer-mode && make How to use exploit make /main This vuln

Actual working exploit for CVE-2021-3345

CVE-2021-3345 Actual working exploit for CVE-2021-3345