Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2021-3571: CVE-2021-3571 linuxptp: wrong length of one-step follow-up in transparent clock (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2021-3571: CVE-2021-3571 linuxptp: wrong length of one-step follow-up in transparent clock (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:P)
Published
07/09/2021
Created
11/11/2021
Added
11/10/2021
Modified
12/15/2023

Description

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.

Solution(s)

  • redhat-upgrade-linuxptp
  • redhat-upgrade-linuxptp-debuginfo
  • redhat-upgrade-linuxptp-debugsource

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;