Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44507

Опубликовано: 15 апр. 2022
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

7.0-005-2.1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

ignored

patch infeasible
esm-apps/jammy

ignored

patch infeasible
esm-apps/noble

not-affected

7.0-005-1build2
esm-apps/xenial

not-affected

code not present
focal

ignored

end of standard support, was ignored [patch infeasible]
impish

ignored

end of life
jammy

ignored

patch infeasible

Показывать по

EPSS

Процентиль: 58%
0.00368
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

CVSS3: 7.5
debian
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...

CVSS3: 7.5
github
почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

EPSS

Процентиль: 58%
0.00368
Низкий

5 Medium

CVSS2

7.5 High

CVSS3