CVE-2021-35942
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash applications or read sensitive information from memory by providing a specially crafted input to the wordexp function in the GNU C Library. It can be exploited when the function is used with untrusted data, potentially leading to service disruptions or data leaks.
Technical Description
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jul 22, 2021
over 4 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
gnu
Product
glibc