An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-31319 An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:25:16.874Z

Reserved: 2021-12-01T00:00:00

Link: CVE-2021-44486

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-15T18:15:08.560

Modified: 2024-11-21T06:31:04.140

Link: CVE-2021-44486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses