An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to eb_div in sr_port/eb_muldiv.c allows attackers to crash the application by performing a divide by zero.
References
Link | Resource |
---|---|
https://gitlab.com/YottaDB/DB/YDB/-/issues/828 | Exploit Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2022, 17:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:* |
22 Apr 2022, 15:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yottadb:yottadb:7.0-000:*:*:*:*:*:*:* cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - Exploit, Release Notes, Third Party Advisory | |
CWE | CWE-20 |
15 Apr 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-15 18:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-44483
Mitre link : CVE-2021-44483
CVE.ORG link : CVE-2021-44483
JSON object : View
Products Affected
yottadb
- yottadb
fisglobal
- gt.m
CWE
CWE-20
Improper Input Validation