Vulnerabilities > CVE-2021-37232 - Out-of-bounds Write vulnerability in Atomicparsley Project Atomicparsley
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1
- https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1
- https://github.com/wez/atomicparsley/issues/32
- https://github.com/wez/atomicparsley/issues/32
- https://security.gentoo.org/glsa/202305-01
- https://security.gentoo.org/glsa/202305-01