CVE-2021-3053

Beschreibung:
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. This issue does not affect Prisma Access.

CWE: CWE-755

CVSS-Bewertung
CVSS 2: HIGH – 7.1 (Version: 2.0)
CVSS 3: HIGH – 7.5 (Version: 3.1)

Links:

NVD – CVE-2021-3053
CVE – CVE-2021-3053

Link (max. 20) Quelle Tags
N/A CONFIRM Vendor Advisory Vendor Advisory Third Party Advisory Third Party Advisory
DSA-4968 DEBIAN Third Party Advisory Third Party Advisory
https://www.mail-archive.com/haproxy@formilux.org MISC Third Party Advisory Third Party Advisory Third Party Advisory
https://www.mail-archive.com/haproxy@formilux.org/msg41114.html MISC Mitigation Third Party Advisory
https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ MISC Exploit Mitigation Third Party Advisory
https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 MISC Patch Third Party Advisory
[cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x) MLIST Mailing List Third Party Advisory
[cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x) MLIST Mailing List Third Party Advisory

Quelle: NVD – CVE-2021-3053
Datum Veröffentlichung: 2021-09-08T17:15Z, Datum letzte Änderung: 2021-09-15T19:29Z