Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.
Solution:
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | patch third party advisory us government resource |