
Cloud Vulnerability DB
A community-led vulnerabilities database
A Buffer Overflow vulnerability was discovered in zlog version 1.2.15. The vulnerability exists in the zlogconfbuildwithfile function within src/zlog/src/conf.c. This security issue was assigned CVE-2021-43521 and was publicly disclosed on November 3, 2021 (MITRE, NVD).
The vulnerability is a stack-buffer-overflow that occurs in the zlogconfbuildwithfile function. The issue involves a byte read overflow that can underflow the 'line' buffer. If specific memory conditions are met (such as encountering values like 0x20 or 0x90 that represent spaces), subsequent pointer operations can lead to write overflow conditions (GitHub Issue). The vulnerability has been assigned a CVSS score of 5.0, indicating medium severity (CISA).
The exploitation of this vulnerability could potentially lead to denial of service conditions or system crashes. In certain circumstances, it might also allow for information disclosure or memory corruption (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."