CVE-2021-35942
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash applications or read sensitive information from memory by providing a specially crafted input to the wordexp function in the GNU C Library. It can be exploited when the function is used with untrusted data, potentially leading to service disruptions or data leaks.
Technical Description
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jul 22, 2021
over 4 years ago
Last Modified
Feb 13, 2026
about 2 months ago
Vendor
gnu
Product
glibc
Related Vulnerabilities
An attacker can exploit a flaw in GRUB's gettext module to crash the system, leading to a Denial of Service. This happens because the system mistakenly keeps a command in memory after it should have been removed, allowing the attacker to trigger errors when that command is called.
This vulnerability allows an attacker to run malicious code on a victim's system by tricking them into opening a specially crafted ISO 9660 image file. It affects libcdio version 2.2.0 and can be exploited if the attacker can get the victim to use this outdated version of the software.