Fisglobal

Gt.M

28 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:07

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in or...

  • EPSS 0.25%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:07

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fau...

  • EPSS 0.37%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:07

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of NULL checks in calls to ious_open in sr_unix/ious_open.c allows attackers to crash the application by dereferencing a NULL pointer.

  • EPSS 0.35%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:07

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

  • EPSS 0.35%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value ...

  • EPSS 0.35%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to va_arg on an empty variadic parameter list, most likely causing a memory segmentation fault.

  • EPSS 0.25%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size of a memset that occurs in calls to util_format in sr_unix/util_output.c.

  • EPSS 0.35%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause calls to ZRead to crash due to a NULL pointer dereference.

  • EPSS 0.25%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of input validation in calls to eb_div in sr_port/eb_muldiv.c allows attackers to crash the application by performing a divide by zero.

  • EPSS 0.4%
  • Published 15.04.2022 18:15:09
  • Last modified 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which i...