First published: Fri Apr 15 2022(Updated: )
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size of a memset that occurs in calls to util_format in sr_unix/util_output.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
YottaDB | <=7.0-000 | |
debian/fis-gtm | <=6.3-014-3 | 7.0-005-1 7.1-006-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44502 has been classified as a vulnerability that could allow an attacker to exploit the affected system.
To fix CVE-2021-44502, upgrade to FIS GT.M version 7.0-002 or later.
CVE-2021-44502 affects FIS GT.M through version 7.0-000.
CVE-2021-44502 is a vulnerability that allows an attacker to control memory operations through crafted input.
Yes, CVE-2021-44502 can potentially be exploited by an attacker with the right crafted input.