Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44499

Опубликовано: 15 апр. 2022
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

7.0-005-2.1
esm-apps/bionic

ignored

patch infeasible
esm-apps/focal

ignored

patch infeasible
esm-apps/jammy

ignored

patch infeasible
esm-apps/noble

not-affected

7.0-005-1build2
esm-apps/xenial

ignored

patch infeasible
focal

ignored

end of standard support, was ignored [patch infeasible]
impish

ignored

end of life
jammy

ignored

patch infeasible

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
debian
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...

CVSS3: 7.5
github
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

5 Medium

CVSS2

7.5 High

CVSS3