CVE-2021-35942

Critical
|9.1
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to crash applications or read sensitive information from memory by providing a specially crafted input to the wordexp function in the GNU C Library. It can be exploited when the function is used with untrusted data, potentially leading to service disruptions or data leaks.

Technical Description

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade FPatched in 1667 days

Quick Information

Published

Jul 22, 2021

over 4 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

gnu

Product

glibc