CVE-2021-33430

A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user
References
Link Resource
https://github.com/numpy/numpy/issues/18939 Exploit Third Party Advisory
https://github.com/numpy/numpy/issues/18939 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://github.com/numpy/numpy/issues/18939 - Exploit, Third Party Advisory () https://github.com/numpy/numpy/issues/18939 - Exploit, Third Party Advisory

07 Nov 2023, 03:35

Type Values Removed Values Added
Summary ** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user. A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user

Information

Published : 2021-12-17 19:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33430

Mitre link : CVE-2021-33430

CVE.ORG link : CVE-2021-33430


JSON object : View

Products Affected

numpy

  • numpy
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')