Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-120 | CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| CWE | CWE-122 | CWE-122 Heap-based Buffer Overflow |
| CWE | CWE-190 | CWE-190 Integer Overflow or Wraparound |
Type: CWE
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
Description: CWE-122 Heap-based Buffer Overflow
Type: CWE
Description: CWE-190 Integer Overflow or Wraparound
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 6.9 | MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-46 | CAPEC-46 Overflow Variables and Tags |
Description: CAPEC-46 Overflow Variables and Tags