A vulnerability, which was classified as critical, was found in c-blosc2 up to 2.13.2. Affected is the function ndlz8_decompress of the file /src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.14.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-259050 is the identifier assigned to this vulnerability.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://vuldb.com/?id.259050 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.259050 | signature vdb entry permissions required |
https://vuldb.com/?submit.304556 | third party advisory vdb entry exploit |
https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing | product exploit |
https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3 | patch release notes |