Описание
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.0-000 (включая)Версия до 1.32 (включая)
Одно из
cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*
cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 51%
0.0028
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 7.5
ubuntu
почти 4 года назад
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.
CVSS3: 7.5
github
почти 4 года назад
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.
EPSS
Процентиль: 51%
0.0028
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20