CVE-2021-42257
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
11/10/2021
Last modified:
14/11/2023
Description
check_smart before 6.9.1 allows unintended drive access by an unprivileged user because it only checks for a substring match of a device path (the /dev/bus substring and a number), aka an unanchored regular expression.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:check_smart_project:check_smart:*:*:*:*:*:*:*:* | 6.9.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/10/14/2
- https://bugzilla.suse.com/show_bug.cgi?id=1183057
- https://nvd.nist.gov/vuln/detail/CVE-2021-42257
- https://www.claudiokuenzler.com/blog/1068/check_smart-6.9.1-security-fix-release-pseudo-device-path
- https://www.claudiokuenzler.com/monitoring-plugins/check_smart.php



