Impact
Is‑Daouda's is‑Engine contains an out‑of‑bounds write that causes a heap‑based buffer overflow. The flaw can corrupt memory beyond the intended buffer size, potentially leading to a crash or other unintended behavior. The vulnerability is classified as a memory corruption issue (CWE‑122, CWE‑787).
Affected Systems
All instances of Is‑Daouda is‑Engine older than version 3.3.4 are affected. The product is listed as is‑Engine and the vulnerability applies to every release before 3.3.4. No other affected products or versions are documented in the available data.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation, and the vulnerability is not recorded in CISA's KEV catalog. The description infers that the overflow can be triggered by supplied input, so the likely attack vector is remote. However, the specific exposure (network vs local) is not detailed in the advisory, so environments should verify whether is‑Engine processes external data. Exploitation would require crafting input that overflows the heap buffer; no authentication or privilege escalation is described, which limits the impact to the privileges of the running process.
OpenCVE Enrichment