Impact
The vulnerability occurs in HTSlib's CRAM decoder when processing VARINT and CONST encodings; missing validation can allow up to eight bytes to be written beyond the allocated buffer, causing a heap or stack overflow. Attack via a maliciously crafted CRAM file could crash the application, corrupt internal data structures, or modify control flow, potentially leading to arbitrary code execution.
Affected Systems
The issue affects the htslib library used by samtools. Versions earlier than 1.23.1, 1.22.2 and 1.21.1 are vulnerable. The fix is included in v1.23.1, v1.22.2, and v1.21.1.
Risk and Exploitability
The CVSS score is 8.8, indicating high severity, while the EPSS score is less than 1%, suggesting a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a maliciously crafted CRAM file that an application using HTSlib will parse; thus the primary vector is a file-based attack.
OpenCVE Enrichment