First published: Fri Apr 15 2022(Updated: )
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause a type to be incorrectly initialized in the function f_incr in sr_port/f_incr.c and cause a crash due to a NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
YottaDB | <=7.0-000 | |
debian/fis-gtm | <=6.3-014-3 | 7.0-005-1 7.1-006-1 |
<=7.0-000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-44498.
The GT.M software versions up to and including V7.0-000 are affected by this vulnerability.
The severity rating of CVE-2021-44498 is high, with a severity value of 7.5.
Attackers can exploit this vulnerability by using crafted input to cause a type to be incorrectly initialized in the function f_incr in sr_port/f_incr.c and cause a crash due to a NULL pointer dereference.
Yes, you can find more information about this vulnerability at the following references: [Reference 1](http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html), [Reference 2](https://gitlab.com/YottaDB/DB/YDB/-/issues/828), [Reference 3](https://sourceforge.net/projects/fis-gtm/files/).