CVE-2021-21704

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
References
Link Resource
https://bugs.php.net/bug.php?id=76448 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76449 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76450 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76452 Exploit Issue Tracking Patch Vendor Advisory
https://security.gentoo.org/glsa/202209-20 Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0006/ Third Party Advisory
https://bugs.php.net/bug.php?id=76448 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76449 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76450 Exploit Issue Tracking Patch Vendor Advisory
https://bugs.php.net/bug.php?id=76452 Exploit Issue Tracking Patch Vendor Advisory
https://security.gentoo.org/glsa/202209-20 Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0006/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
References () https://bugs.php.net/bug.php?id=76448 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.php.net/bug.php?id=76448 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://bugs.php.net/bug.php?id=76449 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.php.net/bug.php?id=76449 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://bugs.php.net/bug.php?id=76450 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.php.net/bug.php?id=76450 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://bugs.php.net/bug.php?id=76452 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.php.net/bug.php?id=76452 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/202209-20 - Third Party Advisory () https://security.gentoo.org/glsa/202209-20 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20211029-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20211029-0006/ - Third Party Advisory
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 5.0

Information

Published : 2021-10-04 04:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21704

Mitre link : CVE-2021-21704

CVE.ORG link : CVE-2021-21704


JSON object : View

Products Affected

php

  • php

netapp

  • clustered_data_ontap
CWE
CWE-125

Out-of-bounds Read

CWE-190

Integer Overflow or Wraparound

CWE-787

Out-of-bounds Write