First published: Fri Apr 15 2022(Updated: )
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of input validation in calls to eb_div in sr_port/eb_muldiv.c allows attackers to crash the application by performing a divide by zero.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
YottaDB | <=7.0-000 | |
debian/fis-gtm | <=6.3-014-3 | 7.0-005-1 7.1-006-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier for this issue is CVE-2021-44500.
The severity of CVE-2021-44500 is high with a CVSS score of 7.5.
FIS GT.M through V7.0-000 (related to the YottaDB code base) is affected by CVE-2021-44500.
An attacker can exploit CVE-2021-44500 by performing a divide by zero, causing the application to crash.
Yes, there is a fix available for CVE-2021-44500. It is recommended to update to a version of FIS GT.M that addresses the issue.