CVE-2021-38383

Critical
|9.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute arbitrary code on the OwnTone server, potentially taking control of the system. It occurs due to a flaw in the way the server handles memory, but the attacker must be able to send specially crafted network requests to exploit it.

Technical Description

OwnTone (aka owntone-server) through 28.1 has a use-after-free in net_bind() in misc.c.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1648 days

Quick Information

Published

Aug 10, 2021

over 4 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

owntone

Product

owntone server