Описание
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 7.0-005-2.1 |
| esm-apps/bionic | ignored | patch infeasible |
| esm-apps/focal | ignored | patch infeasible |
| esm-apps/jammy | ignored | patch infeasible |
| esm-apps/noble | not-affected | 7.0-005-1build2 |
| esm-apps/xenial | ignored | patch infeasible |
| focal | ignored | end of standard support, was ignored [patch infeasible] |
| impish | ignored | end of life |
| jammy | ignored | patch infeasible |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.
An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.
5 Medium
CVSS2
7.5 High
CVSS3