CVE-2021-44499
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow.
Se ha detectado un problema en FIS GT.M versiones hasta V7.0-000 (relacionado con la base de código YottaDB). Usando una entrada diseñada, un atacante puede hacer que una llamada a la función $Extract obligue a un entero con signo que contenga el tamaño de un búfer a tomar un número negativo grande, que luego es usado como la longitud de una llamada memcpy que es producida en la pila, causando un desbordamiento del búfer
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-01 CVE Reserved
- 2022-04-15 CVE Published
- 2024-08-04 CVE Updated
- 2024-12-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html | Release Notes | |
https://sourceforge.net/projects/fis-gtm/files | Product |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://gitlab.com/YottaDB/DB/YDB/-/issues/828 | 2022-04-22 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fisglobal Search vendor "Fisglobal" | Gt.m Search vendor "Fisglobal" for product "Gt.m" | <= 7.0-000 Search vendor "Fisglobal" for product "Gt.m" and version " <= 7.0-000" | - |
Affected
|