CVE Vulnerabilities

CVE-2021-28683

NULL Pointer Dereference

Published: May 20, 2021 | Modified: May 27, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy 1.16.2 (including) 1.16.2 (including)
Envoy Envoyproxy 1.17.1 (including) 1.17.1 (including)
OpenShift Service Mesh 1.1 RedHat servicemesh-proxy-0:1.1.13-1.el8 *
OpenShift Service Mesh 2.0 RedHat servicemesh-proxy-0:2.0.3-1.el8 *

Potential Mitigations

References