{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-33635","assignerOrgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","state":"PUBLISHED","assignerShortName":"openEuler","dateReserved":"2021-05-28T14:26:05.942Z","datePublished":"2023-10-29T07:56:44.304Z","dateUpdated":"2024-09-09T14:20:16.034Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://gitee.com/src-openeuler","defaultStatus":"unaffected","modules":["image"],"packageName":"iSulad","platforms":["Linux"],"product":"iSulad","programFiles":["https://gitee.com/openeuler/iSulad/blob/master/src/utils/tar/util_archive.c"],"repo":"https://gitee.com/src-openeuler/iSulad","vendor":"openEuler","versions":[{"changes":[{"at":"0102-fix-loading-of-nsswitch-based-config-inside-chr.patch","status":"unaffected"},{"at":"0106-fix-loading-of-nsswitch-based-config-inside-chroot-u.patch","status":"unaffected"}],"lessThanOrEqual":"2.0.8-20210518.144540.git5288ed93,2.0.18-10,2.1.2","status":"affected","version":"0","versionType":"patch"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"panwenjie2@huawei.com"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"When malicious images are pulled by isula pull, attackers can execute arbitrary code."}],"value":"When malicious images are pulled by isula pull, attackers can execute arbitrary code."}],"impacts":[{"capecId":"CAPEC-234","descriptions":[{"lang":"en","value":"CAPEC-234 Hijacking a privileged process"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-665","description":"CWE-665 Improper Initialization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","shortName":"openEuler","dateUpdated":"2023-10-29T07:56:44.304Z"},"references":[{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686"},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/627/files"},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/600/files"}],"source":{"discovery":"UNKNOWN"},"title":"Pull malicious images may cause process to be hijacked","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:58:21.480Z"},"title":"CVE Program Container","references":[{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686","tags":["x_transferred"]},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/627/files","tags":["x_transferred"]},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/600/files","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"affected":[{"vendor":"openeuler","product":"isulad","cpes":["cpe:2.3:a:openeuler:isulad:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"2.0.8-20210518.144540.git5288ed93,2.0.18-10,2.1.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-09T14:17:09.942436Z","id":"CVE-2021-33635","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-09T14:20:16.034Z"}}]}}