An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption.
References
Link | Resource |
---|---|
https://github.com/debauchee/barrier/releases/tag/v2.4.0 | Release Notes Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/11/02/4 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIEVNCFEFO7L3NTM4VUZB3WKYYCBTFCI/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMU3STOKHPEZSC54MZ42YBFFC2R3BU2Q/ | Mailing List Third Party Advisory |
Information
Published : 2021-11-07 20:15
Updated : 2022-05-15 06:28
NVD link : CVE-2021-42072
Mitre link : CVE-2021-42072
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
barrier_project
- barrier
fedoraproject
- fedora