Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*.
Problem Types
Type | CWE ID | Description |
---|
CWE | CWE-120 | CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
CWE | CWE-121 | CWE-121 Stack-based Buffer Overflow |
Type: CWE
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
Description: CWE-121 Stack-based Buffer Overflow
Metrics
Version | Base score | Base severity | Vector |
---|
4.0 | 6.9 | MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Impacts
CAPEC ID | Description |
---|
CAPEC-46 | CAPEC-46 Overflow Variables and Tags |
Description: CAPEC-46 Overflow Variables and Tags