CVE Vulnerabilities

CVE-2021-44504

Incorrect Calculation

Published: Apr 15, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault.

Weakness

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Affected Software

NameVendorStart VersionEnd Version
Gt.mFisglobal*7.0-000 (including)
Fis-gtmUbuntubionic*
Fis-gtmUbuntuesm-apps/bionic*
Fis-gtmUbuntuesm-apps/focal*
Fis-gtmUbuntuesm-apps/jammy*
Fis-gtmUbuntuesm-apps/xenial*
Fis-gtmUbuntufocal*
Fis-gtmUbuntuimpish*
Fis-gtmUbuntujammy*
Fis-gtmUbuntukinetic*
Fis-gtmUbuntulunar*
Fis-gtmUbuntumantic*
Fis-gtmUbuntuupstream*

Potential Mitigations

  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).

References