Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jqwh-75jw-fm6m

Опубликовано: 16 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.

EPSS

Процентиль: 58%
0.00367
Низкий

7.5 High

CVSS3

Дефекты

CWE-682

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.

CVSS3: 7.5
nvd
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.

CVSS3: 7.5
debian
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...

EPSS

Процентиль: 58%
0.00367
Низкий

7.5 High

CVSS3

Дефекты

CWE-682