HomeNbdkit ProjectCVE-2021-3716

CVE-2021-3716

LOW
3.1CVSS
Published: 2022-03-02
Updated: 2024-11-21
AI Analysis

Description

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack Vector
network
Complexity
high
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
low
Weaknesses
CWE-924NVD-CWE-Other

Metadata

Primary Vendor
NBDKIT_PROJECT
Published
3/2/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

nbdkit_project : nbdkitnbdkit_project : nbdkitnbdkit_project : nbdkitredhat : enterprise_linuxredhat : enterprise_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-3716 | LOW Severity | CVEDatabase.com | CVEDatabase.com