Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-41253
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-08 Nov, 2021 | 21:45
Updated At-04 Aug, 2024 | 03:08
Rejected At-
▼CVE Numbering Authority (CNA)
Possible heap buffer overflow when using zycore string functions in formatter hooks

Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.

Affected Products
Vendor
zyantific
Product
zydis
Versions
Affected
  • < 3.2.1
Problem Types
TypeCWE IDDescription
CWECWE-122CWE-122: Heap-based Buffer Overflow
CWECWE-457CWE-457: Use of Uninitialized Variable
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/zyantific/zydis/security/advisories/GHSA-q42v-hv86-3m4g
x_refsource_CONFIRM
https://github.com/zyantific/zydis/commit/55dd08c210722aed81b38132f5fd4a04ec1943b5
x_refsource_MISC
https://huntr.dev/bounties/96b0a482-7041-45b1-9327-c6a4a8f32d3a
x_refsource_MISC
https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/zyantific/zydis/security/advisories/GHSA-q42v-hv86-3m4g
x_refsource_CONFIRM
x_transferred
https://github.com/zyantific/zydis/commit/55dd08c210722aed81b38132f5fd4a04ec1943b5
x_refsource_MISC
x_transferred
https://huntr.dev/bounties/96b0a482-7041-45b1-9327-c6a4a8f32d3a
x_refsource_MISC
x_transferred
https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784
x_refsource_MISC
x_transferred
Details not found