An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. This is a digs-- calculation.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Link | Tags |
---|---|
https://gitlab.com/YottaDB/DB/YDB/-/issues/828 | third party advisory issue tracking exploit |