5.5
CVSSv2

CVE-2021-3571

Published: 09/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 7.1 | Impact Score: 4.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Vulnerability Summary

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions prior to 3.1.1 and prior to 2.0.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxptp project linuxptp

redhat enterprise linux 8.0

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #990749 linuxptp: CVE-2021-3571 Package: src:linuxptp; Maintainer for src:linuxptp is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 6 Jul 2021 07:06:01 UTC Severity: grave Tags: security, upstream Found i ...
A flaw was found in the ptp4l program of the linuxptp package When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash The highest threat from this vulnerability is to data confidentiality and system availability (CVE-202 ...