Логотип exploitDog
bind:CVE-2021-44499
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-44499

Количество 4

Количество 4

ubuntu логотип

CVE-2021-44499

почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-44499

почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-44499

почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2rxp-2ccg-vg6g

почти 4 года назад

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-44499

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-44499

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-44499

An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-2rxp-2ccg-vg6g

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.

CVSS3: 7.5
0%
Низкий
почти 4 года назад

Уязвимостей на страницу