CVE-2021-21783

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245 Exploit Technical Description Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:genivia:gsoap:2.8.107:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_lsms:13.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_lsms:13.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_lsms:13.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tekelec_virtual_operating_environment:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-03-25 17:15

Updated : 2024-02-28 18:08


NVD link : CVE-2021-21783

Mitre link : CVE-2021-21783

CVE.ORG link : CVE-2021-21783


JSON object : View

Products Affected

oracle

  • tekelec_virtual_operating_environment
  • communications_lsms
  • communications_eagle_lnp_application_processor
  • communications_eagle_application_processor
  • communications_diameter_signaling_router

genivia

  • gsoap
CWE
CWE-190

Integer Overflow or Wraparound

CWE-680

Integer Overflow to Buffer Overflow