CVE-2021-43396
Summary
| CVE | CVE-2021-43396 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-04 20:15:00 UTC |
| Updated | 2023-11-07 03:39:00 UTC |
| Description | ** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug." |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Gnu | Glibc | 2.34 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Binding Support Function | 22.1.3 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Network Function Cloud Native Environment | 22.1.0 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Network Repository Function | 22.1.2 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Network Repository Function | 22.2.0 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Security Edge Protection Proxy | 22.1.1 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Unified Data Repository | 22.2.0 | All | All | All |
| Application | Oracle | Enterprise Operations Monitor | 4.3 | All | All | All |
| Application | Oracle | Enterprise Operations Monitor | 4.4 | All | All | All |
| Application | Oracle | Enterprise Operations Monitor | 5.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 28524 – Conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset | MISC | sourceware.org | |
| Vulnerability in iconv identified by TuxCare Team (CVE-2021-43396) | MISC | blog.tuxcare.com | |
| sourceware.org Git - glibc.git/commit | MISC | sourceware.org | |
| sourceware.org Git - glibc.git/commit | sourceware.org | ||
| Oracle Critical Patch Update Advisory - July 2022 | N/A | www.oracle.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 180459 Debian Security Update for glibc (CVE-2021-43396)
- 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
- 671222 EulerOS Security Update for glibc (EulerOS-SA-2022-1006)
- 671230 EulerOS Security Update for glibc (EulerOS-SA-2022-1026)
- 671255 EulerOS Security Update for glibc (EulerOS-SA-2022-1164)
- 671275 EulerOS Security Update for glibc (EulerOS-SA-2022-1240)
- 671305 EulerOS Security Update for glibc (EulerOS-SA-2022-1252)
- 671350 EulerOS Security Update for glibc (EulerOS-SA-2022-1267)
- 901793 Common Base Linux Mariner (CBL-Mariner) Security Update for glibc (6443-1)