{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-33636","assignerOrgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","state":"PUBLISHED","assignerShortName":"openEuler","dateReserved":"2021-05-28T14:26:05.942Z","datePublished":"2023-10-29T07:58:05.033Z","dateUpdated":"2024-09-09T14:15:38.166Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://gitee.com/src-openeuler","defaultStatus":"unaffected","modules":["image"],"packageName":"iSulad","platforms":["Linux"],"product":"iSulad","programFiles":["https://gitee.com/openeuler/iSulad/blob/master/src/utils/tar/util_archive.c"],"repo":"https://gitee.com/src-openeuler/iSulad","vendor":"openEuler","versions":[{"changes":[{"at":"0102-fix-loading-of-nsswitch-based-config-inside-chr.patch","status":"unaffected"},{"at":"0106-fix-loading-of-nsswitch-based-config-inside-chroot-u.patch","status":"unaffected"}],"lessThanOrEqual":"2.0.8-20210518.144540.git5288ed93,2.0.18-10,2.1.2","status":"affected","version":"0","versionType":"patch"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"panwenjie2@huawei.com"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\nWhen the isula load command is used to load malicious images, attackers can execute arbitrary code.\n\n"}],"value":"\nWhen the isula load command is used to load malicious images, attackers can execute arbitrary code.\n\n"}],"impacts":[{"capecId":"CAPEC-234","descriptions":[{"lang":"en","value":"CAPEC-234 Hijacking a privileged process"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-665","description":"CWE-665 Improper Initialization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7e1ac599-2767-43fa-b3ea-f10178cc98f2","shortName":"openEuler","dateUpdated":"2023-10-29T07:58:05.033Z"},"references":[{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686"},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/627/files"},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/600/files"}],"source":{"discovery":"UNKNOWN"},"title":"Load malicious images may cause process to be hijacked","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:58:22.300Z"},"title":"CVE Program Container","references":[{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686","tags":["x_transferred"]},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/627/files","tags":["x_transferred"]},{"url":"https://gitee.com/src-openeuler/iSulad/pulls/600/files","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"affected":[{"vendor":"openeuler","product":"isulad","cpes":["cpe:2.3:a:openeuler:isulad:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"2.0.8-20210518.144540.git5288ed93,2.0.18-10,2.1.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-09T14:11:00.313285Z","id":"CVE-2021-33636","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-09T14:15:38.166Z"}}]}}