
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-3828 affects the Natural Language Toolkit (NLTK) and was discovered in 2021. It is characterized as an Inefficient Regular Expression Complexity vulnerability that affects NLTK versions up to and including 3.6.3. The issue was identified and reported through the huntr.dev platform (NVD, CVE).
The vulnerability is classified as a Regular Expression Denial of Service (ReDoS) issue in the Corpus Reader component of NLTK. It received a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is associated with CWE-1333 (Inefficient Regular Expression Complexity) and CWE-697 (Incorrect Comparison) (NVD).
When exploited, this vulnerability could allow an attacker to cause a denial of service condition by providing specially crafted input that triggers inefficient regular expression processing. The impact primarily affects the availability of the system, with no direct impact on confidentiality or integrity (Ubuntu Notice).
The vulnerability was fixed in NLTK version 3.6.5-1 and later releases. The fix involved modifying the regular expression pattern in the Corpus Reader component to prevent the ReDoS condition. Users are advised to upgrade to the fixed version. For Ubuntu systems, standard system updates include the necessary patches (Debian Tracker, GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."