logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2021-3999

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2021-3999

Description:
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Last updated date:
02/12/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
08/29/2022
Reference url to background

https://www.openwall.com/lists/oss-security/2022/01/24/4

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy