A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDGGB65YBQL662M3MOBNNJJNRNURW4TG/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMMHD2EOMIVJ7EKZTJJMX4C7E6ZRWDL/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPBS642OYVA6DUKK3HZHEINVWEDZSMEU/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4887 | Third Party Advisory |
https://security.gentoo.org/glsa/202208-01 | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1226 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-03-10 09:15
Updated : 2022-10-07 14:15
NVD link : CVE-2021-21772
Mitre link : CVE-2021-21772
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
3mf
- lib3mf
fedoraproject
- fedora