CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
47.6%
Severity: Critical
Date : 2021-01-29
CVE-ID : CVE-2021-3345
Package : libgcrypt
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-1505
The package libgcrypt before version 1.9.1-1 is vulnerable to arbitrary
code execution.
Upgrade to 1.9.1-1.
The problem has been fixed upstream in version 1.9.1.
None.
_gcry_md_block_write in cipher/hash-common.c in libgcrypt version 1.9.0
has a heap-based buffer overflow when the digest final function sets a
large count value. Just decrypting some data can overflow a heap buffer
with attacker controlled data, no verification or signature is
validated before the vulnerability occurs. The issue is fixed in
version 1.9.1.
An attacker is able to execute arbitrary code on the affected host
before a given signature has been verified.
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html
https://dev.gnupg.org/T5275
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=512c0c75276949f13b6373b5c04f7065af750b08
https://security.archlinux.org/CVE-2021-3345
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
47.6%