An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gt.m | Fisglobal | * | 7.0-000 (including) |
Fis-gtm | Ubuntu | bionic | * |
Fis-gtm | Ubuntu | impish | * |
Fis-gtm | Ubuntu | kinetic | * |
Fis-gtm | Ubuntu | lunar | * |
Fis-gtm | Ubuntu | mantic | * |