Potential stack buffer write overflow in Connext applications while parsing malicious XML types document
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-120 | CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
Type: CWE
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 8.3 | HIGH | CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-46 | CAPEC-46 Overflow Variables and Tags |
Description: CAPEC-46 Overflow Variables and Tags