CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
3.5 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, has been found in OpenBSD Kernel (version unknown). This issue affects an unknown function of the component Multicast Routing Handler. The manipulation with an unknown input leads to a uninitialized resource vulnerability. Using CWE to declare the problem leads to CWE-908. The product uses or accesses a resource that has not been initialized. Impacted is confidentiality. The summary by CVE is:
OpenBSD Kernel Multicast Routing Uninitialized Memory Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14540.
It is possible to read the advisory at zerodayinitiative.com. The identification of this vulnerability is CVE-2021-34999 since 06/17/2021. The exploitation is known to be easy. Attacking locally is a requirement. The technical details are unknown and an exploit is not publicly available.
Upgrading eliminates this vulnerability.
The entry VDB-263460 is related to this item.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.5
VulDB Base Score: 3.3
VulDB Temp Score: 3.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 3.8
CNA Vector (Zero Day Initiative): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Uninitialized resourceCWE: CWE-908
CAPEC: 🔒
ATT&CK: 🔒
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Timeline
06/17/2021 CVE reserved05/07/2024 VulDB entry created
05/08/2024 Advisory disclosed
09/19/2024 VulDB entry last update
Sources
Vendor: openbsd.orgAdvisory: ZDI-22-073
Status: Confirmed
CVE: CVE-2021-34999 (🔒)
See also: 🔒
Entry
Created: 05/08/2024 01:38 AMUpdated: 09/19/2024 03:44 PM
Changes: 05/08/2024 01:38 AM (63), 05/08/2024 10:52 AM (1), 09/19/2024 03:44 PM (2)
Complete: 🔍
Cache ID: 3:9CA:40
We cannot find the cpe indicated by You in the NVD Nist dictionary.
Could You use the official cpe openbsd:openbsd?
We would appreciate it very much.
Best Regards,
TEAM CERT
Are you interested in using VulDB?
Download the whitepaper to learn more about our service!