An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption.
References
Link | Resource |
---|---|
https://github.com/debauchee/barrier/releases/tag/v2.4.0 | Release Notes Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/11/02/4 | Exploit Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMU3STOKHPEZSC54MZ42YBFFC2R3BU2Q/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIEVNCFEFO7L3NTM4VUZB3WKYYCBTFCI/ |
Configurations
History
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-11-08 04:15
Updated : 2023-11-07 03:39
NVD link : CVE-2021-42072
Mitre link : CVE-2021-42072
JSON object : View
Products Affected
fedoraproject
- fedora
barrier_project
- barrier
CWE
CWE-287
Improper Authentication