Buffer Overflow Affecting libmicrohttpd package, versions <0.9.71-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.42% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-LIBMICROHTTPD-5684355
  • published26 Mar 2021
  • disclosed25 Mar 2021

Introduced: 25 Mar 2021

CVE-2021-3466  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Debian:13 libmicrohttpd to version 0.9.71-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libmicrohttpd package and not the libmicrohttpd package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.

CVSS Base Scores

version 3.1