An exploitable out-of-bounds indexing vulnerability exists within the RW fabric message particle type of Aerospike Database Server 3.10.0.3. A specially crafted packet can cause the server to fetch a function table outside the bounds of an array resulting in remote code execution. An attacker can simply connect to the port to trigger this vulnerability.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96372 | broken link third party advisory vdb entry |
http://www.talosintelligence.com/reports/TALOS-2016-0267/ | patch vdb entry exploit third party advisory technical description |