CVE-2021-22925 (CNNVD-202107-1582)

MEDIUM
中文标题:
Arch Linux 安全漏洞
英文标题:
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely ...
CVSS分数: 5.3
发布时间: 2021-08-05 00:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Arch Linux是Arch开源的一个应用系统。一个轻量级且灵活的Linux®发行版,试图使它保持简单。 Arch Linux中存在安全漏洞,该漏洞源于处理TELNET请求并解析NEW_ENV时使用了未初始化的变量,远程攻击者可以利用该漏最多读取1800字节的影响控制TELNET服务器。 受影响的产品及版本包括:Arch Linux:所有版本

英文描述:

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CWE类型:
CWE-908 CWE-200
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
haxx curl * - - cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
fedoraproject fedora 33 - - cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
netapp cloud_backup - - - cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
netapp clustered_data_ontap - - - cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
netapp hci_management_node - - - cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
netapp solidfire - - - cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
apple mac_os_x 10.15.7 - - cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
apple macos 11.0 - - cpe:2.3:o:apple:macos:11.0:*:*:*:*:*:*:*
apple macos 11.0.1 - - cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:*
apple macos 11.1 - - cpe:2.3:o:apple:macos:11.1:*:*:*:*:*:*:*
apple macos 11.1.0 - - cpe:2.3:o:apple:macos:11.1.0:*:*:*:*:*:*:*
apple macos 11.2 - - cpe:2.3:o:apple:macos:11.2:*:*:*:*:*:*:*
apple macos 11.2.1 - - cpe:2.3:o:apple:macos:11.2.1:*:*:*:*:*:*:*
apple macos 11.3 - - cpe:2.3:o:apple:macos:11.3:*:*:*:*:*:*:*
apple macos 11.3.1 - - cpe:2.3:o:apple:macos:11.3.1:*:*:*:*:*:*:*
apple macos 11.4 - - cpe:2.3:o:apple:macos:11.4:*:*:*:*:*:*:*
apple macos 11.5 - - cpe:2.3:o:apple:macos:11.5:*:*:*:*:*:*:*
oracle mysql_server * - - cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.57 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.58 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.59 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
siemens sinec_infrastructure_network_services * - - cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
siemens sinema_remote_connect_server * - - cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
netapp h300s_firmware - - - cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
netapp h500s_firmware - - - cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
netapp h700s_firmware - - - cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
netapp h300e_firmware - - - cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
netapp h500e_firmware - - - cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
netapp h700e_firmware - - - cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
netapp h410s_firmware - - - cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
splunk universal_forwarder * - - cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
splunk universal_forwarder 9.1.0 - - cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
FEDORA-2021-5d21b90a30 vendor-advisory
cve.org
访问
20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina mailing-list
cve.org
访问
20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 mailing-list
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
GLSA-202212-01 vendor-advisory
cve.org
访问
CVSS评分详情
5.3
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS版本: 3.1
机密性
LOW
完整性
NONE
可用性
NONE
时间信息
发布时间:
2021-08-05 00:00:00
修改时间:
2024-08-03 18:58:26
创建时间:
2025-11-11 15:36:40
更新时间:
2025-11-11 15:56:48
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2021-22925 2025-11-11 15:20:49 2025-11-11 07:36:40
NVD nvd_CVE-2021-22925 2025-11-11 14:57:40 2025-11-11 07:45:00
CNNVD cnnvd_CNNVD-202107-1582 2025-11-11 15:10:41 2025-11-11 07:56:48
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:56:48
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202107-1582; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202107-1582
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:00
cvss_score: 未提取 → 5.3; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 32; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.3
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 32
  • data_sources: ['cve'] -> ['cve', 'nvd']