Search for vulnerabilities
Vulnerability details: VCID-zyrm-1dsx-aaab
Vulnerability ID VCID-zyrm-1dsx-aaab
Aliases CVE-2021-3345
Summary _gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual High http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3345.html
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3345.json
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.00176 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.05706 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.06762 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
epss 0.2329 https://api.first.org/data/v1/epss?cve=CVE-2021-3345
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1923210
generic_textual High https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3345
generic_textual High https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08
generic_textual High https://gnupg.org
generic_textual High https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html
generic_textual High https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html
cvssv2 7.2 https://nvd.nist.gov/vuln/detail/CVE-2021-3345
cvssv3 7.8 https://nvd.nist.gov/vuln/detail/CVE-2021-3345
cvssv3.1 7.8 https://nvd.nist.gov/vuln/detail/CVE-2021-3345
archlinux Critical https://security.archlinux.org/AVG-1505
cvssv3.1 5.3 https://www.oracle.com//security-alerts/cpujul2021.html
generic_textual MODERATE https://www.oracle.com//security-alerts/cpujul2021.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3345.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3345.json
https://api.first.org/data/v1/epss?cve=CVE-2021-3345
https://bugs.gentoo.org/show_bug.cgi?id=767814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3345
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=512c0c75276949f13b6373b5c04f7065af750b08
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08
https://gnupg.org
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000455.html
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html
https://www.oracle.com//security-alerts/cpujul2021.html
1923210 https://bugzilla.redhat.com/show_bug.cgi?id=1923210
981370 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370
ASA-202101-45 https://security.archlinux.org/ASA-202101-45
AVG-1505 https://security.archlinux.org/AVG-1505
cpe:2.3:a:gnupg:libgcrypt:1.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*
CVE-2021-3345 https://nvd.nist.gov/vuln/detail/CVE-2021-3345
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3345.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3345
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3345
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3345
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com//security-alerts/cpujul2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.27895
EPSS Score 0.00061
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.