CVE-2021-3345

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnupg:libgcrypt:1.9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:37

Type Values Removed Values Added
References
  • {'url': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08', 'name': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=512c0c75276949f13b6373b5c04f7065af750b08 -

26 Apr 2022, 16:08

Type Values Removed Values Added
References
  • (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory
First Time Oracle
Oracle communications Billing And Revenue Management
CPE cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*

04 Feb 2021, 15:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
CPE cpe:2.3:a:gnupg:libgcrypt:1.9.0:*:*:*:*:*:*:*
CWE CWE-787
References (MISC) https://gnupg.org - (MISC) https://gnupg.org - Vendor Advisory
References (MISC) https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html - (MISC) https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html - Mailing List, Patch, Vendor Advisory
References (MISC) https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html - (MISC) https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html - Mailing List, Vendor Advisory
References (MISC) https://bugs.gentoo.org/show_bug.cgi?id=767814 - (MISC) https://bugs.gentoo.org/show_bug.cgi?id=767814 - Issue Tracking, Vendor Advisory
References (MISC) https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08 - (MISC) https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08 - Mailing List, Patch, Third Party Advisory

03 Feb 2021, 00:15

Type Values Removed Values Added
Summary _gcry_md_block_write in cipher/hash-common.c in Libgcrypt before 1.9.1 has a heap-based buffer overflow when the digest final function sets a large count value. _gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

29 Jan 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) https://bugs.gentoo.org/show_bug.cgi?id=767814 -

29 Jan 2021, 16:14

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-29 15:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-3345

Mitre link : CVE-2021-3345

CVE.ORG link : CVE-2021-3345


JSON object : View

Products Affected

oracle

  • communications_billing_and_revenue_management

gnupg

  • libgcrypt
CWE
CWE-787

Out-of-bounds Write