{"api_version":"1","generated_at":"2026-04-23T09:39:41+00:00","cve":"CVE-2021-21813","urls":{"html":"https://cve.report/CVE-2021-21813","api":"https://cve.report/api/cve/CVE-2021-21813.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-21813","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-21813"},"summary":{"title":"CVE-2021-21813","description":"Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to memcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2021-08-13 23:15:00","updated_at":"2022-10-06 18:19:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280","refsource":"MISC","tags":[],"title":"TALOS-2021-1280 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-21813","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21813","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"21813","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"att","cpe5":"labs\\'_xmill","cpe6":"0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"21813","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"att","cpe5":"xmill","cpe6":"0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-21813","ASSIGNER":"talos-cna@cisco.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"AT&T","version":{"version_data":[{"version_value":"AT&T Labs Xmill 0.7"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"stack-based buffer overflow"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280"}]},"description":{"description_data":[{"lang":"eng","value":"Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to memcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow."}]},"impact":{"cvss":{"baseScore":7.8,"baseSeverity":"High","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.0"}}},"nvd":{"publishedDate":"2021-08-13 23:15:00","lastModifiedDate":"2022-10-06 18:19:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"21813","Ordinal":"196502","Title":"CVE-2021-21813","CVE":"CVE-2021-21813","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"21813","Ordinal":"1","NoteData":"Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to memcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"21813","Ordinal":"2","NoteData":"2021-08-13","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"21813","Ordinal":"3","NoteData":"2021-08-13","Type":"Other","Title":"Modified"}]}}}