CVE-2021-43396

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
VendorProductVersion
gnuglibc
2.34
oraclecommunications_cloud_native_core_binding_support_function
22.1.3
oraclecommunications_cloud_native_core_network_function_cloud_native_environment
22.1.0
oraclecommunications_cloud_native_core_network_repository_function
22.1.2
oraclecommunications_cloud_native_core_network_repository_function
22.2.0
oraclecommunications_cloud_native_core_security_edge_protection_proxy
22.1.1
oraclecommunications_cloud_native_core_unified_data_repository
22.2.0
oracleenterprise_operations_monitor
4.3
oracleenterprise_operations_monitor
4.4
oracleenterprise_operations_monitor
5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
glibc
bullseye
2.31-13+deb11u11
fixed
buster
not-affected
stretch
not-affected
bullseye (security)
2.31-13+deb11u10
fixed
bookworm
2.36-9+deb12u8
fixed
bookworm (security)
2.36-9+deb12u7
fixed
sid
2.40-3
fixed
trixie
2.40-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
eglibc
jammy
dne
impish
dne
hirsute
dne
focal
dne
bionic
dne
xenial
dne
trusty
not-affected
glibc
jammy
not-affected
impish
not-affected
hirsute
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne