ID CVE-2021-37232
Summary A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
References
Vulnerable Configurations
  • cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:20200701.154658.b0d6223:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:20200701.154658.b0d6223:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:20201231.092811.cbecfb1:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:20201231.092811.cbecfb1:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:20210114.184825.1dbe1be:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:20210114.184825.1dbe1be:*:*:*:*:*:*:*
  • cpe:2.3:a:atomicparsley_project:atomicparsley:20210124.204813.840499f:*:*:*:*:*:*:*
    cpe:2.3:a:atomicparsley_project:atomicparsley:20210124.204813.840499f:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-05-2023 - 11:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
Last major update 03-05-2023 - 11:15
Published 04-08-2021 - 10:15
Last modified 03-05-2023 - 11:15
Back to Top