Vigil@nce - libgetdata: use after free via Dirfile Database, analyzed on 17/05/2021

Vigil@nce - libgetdata: use after free via Dirfile Database, analyzed on 17/05/2021

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.







Synthesis of the vulnerability 


An attacker can force the usage of a freed memory area via Dirfile Database of libgetdata, in order to trigger a denial of service, and possibly to run code.Vulnerable software: Debian.Severity of this announce: 2/4.Creation date: 17/05/2021.Références of this computer vulnerability: CVE-2021-20204, DLA-2660-1, VIGILANCE-VUL-35413.

Description of the vulnerability 


An attacker can force the usage of a freed memory area via Dirfile Database of libgetdata, in order to trigger a denial of service, and possibly to run code.Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity bulletin impacts software or systems such as Debian.

Our Vigil@nce team determined that the severity of this cybersecurity weakness is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability bulletin.

Solutions for this threat 


Debian 9: new libgetdata packages.New packages are available:  Debian 9: libgetdata 0.9.4-1+deb9u1Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service ..

Support the originator by clicking the read the rest link below.