7.5
CVSSv3

CVE-2021-43396

Published: 04/11/2021 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc 2.34

oracle communications cloud native core network function cloud native environment 22.1.0

oracle communications cloud native core binding support function 22.1.3

oracle communications cloud native core network repository function 22.2.0

oracle communications cloud native core security edge protection proxy 22.1.1

oracle communications cloud native core network repository function 22.1.2

oracle enterprise operations monitor 4.3

oracle enterprise operations monitor 4.4

oracle enterprise operations monitor 5.0

oracle communications cloud native core unified data repository 22.2.0

Vendor Advisories

Debian Bug report logs - #998622 glibc: CVE-2021-43396: Conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 5 Nov 2 ...
In iconvdata/iso-2022-jp-3c in the GNU C Library (aka glibc) 234, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset This may affect data integrity in certain iconv() use cases ...
In iconvdata/iso-2022-jp-3c in the GNU C Library (aka glibc) 234, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset This may affect data integrity in certain iconv() use cases ...