CVE-2021-23017

A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
f5CNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
f5nginx
0.6.18 ≤
𝑥
< 1.20.1
openrestyopenresty
𝑥
< 1.19.3.2
netappontap_select_deploy_administration_utility
-
oracleblockchain_platform
𝑥
< 21.1.2
oraclecommunications_control_plane_monitor
3.4
oraclecommunications_control_plane_monitor
4.2
oraclecommunications_control_plane_monitor
4.3
oraclecommunications_control_plane_monitor
4.4
oraclecommunications_fraud_monitor
3.4 ≤
𝑥
≤ 4.4
oraclecommunications_operations_monitor
3.4
oraclecommunications_operations_monitor
4.2
oraclecommunications_operations_monitor
4.3
oraclecommunications_operations_monitor
4.4
oraclecommunications_session_border_controller
8.4
oraclecommunications_session_border_controller
9.0
oracleenterprise_communications_broker
3.3.0
oracleenterprise_session_border_controller
8.4
oracleenterprise_session_border_controller
9.0
oracleenterprise_telephony_fraud_monitor
3.4
oracleenterprise_telephony_fraud_monitor
4.2
oracleenterprise_telephony_fraud_monitor
4.3
oracleenterprise_telephony_fraud_monitor
4.4
oraclegoldengate
𝑥
< 21.4.0.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nginx
bullseye (security)
1.18.0-6.1+deb11u3
fixed
bullseye
1.18.0-6.1+deb11u3
fixed
bookworm
1.22.1-9
fixed
sid
1.26.0-3
fixed
trixie
1.26.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nginx
jammy
Fixed 1.18.0-6ubuntu9
released
impish
Fixed 1.18.0-6ubuntu9
released
hirsute
Fixed 1.18.0-6ubuntu8.2
released
groovy
Fixed 1.18.0-6ubuntu2.2
released
focal
Fixed 1.18.0-0ubuntu1.2
released
bionic
Fixed 1.14.0-0ubuntu1.9
released
xenial
Fixed 1.10.3-0ubuntu0.16.04.5+esm1
released
trusty
Fixed 1.4.6-1ubuntu3.9+esm2
released
References