Files
CVEs-PoC/2021/CVE-2021-3520.md
T
2024-06-18 02:51:15 +02:00

21 lines
1.0 KiB
Markdown

### [CVE-2021-3520](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520)
![](https://img.shields.io/static/v1?label=Product&message=lz4&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20lz4-1.8.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190-%3ECWE-787&color=brighgreen)
### Description
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
### POC
#### Reference
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fkie-cad/nvd-json-data-feeds