Skip to main content

Integer Overflow or Wraparound

CVE-2021-35942

Severity High
Score 9.1/10

Summary

The "wordexp" function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in "parse_param" (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because "atoi" was used but "strtoul" should have been used to ensure correct calculations.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-190 - Integer Overflow or Wraparound

The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.

Advisory Timeline

  • Published