Vulnerability Details : CVE-2021-45927
MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).
Vulnerability category: OverflowMemory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2021-45927
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 33 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-45927
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-45927
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-45927
-
https://github.com/mdbtools/mdbtools/commit/373b7ff4c4daf887269c078407cb1338942c4ea6
Version 0.9.3, final · mdbtools/mdbtools@373b7ff · GitHubPatch;Third Party Advisory
-
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/mdbtools/OSV-2021-1003.yaml
oss-fuzz-vulns/OSV-2021-1003.yaml at main · google/oss-fuzz-vulns · GitHubExploit;Third Party Advisory
-
https://security.gentoo.org/glsa/202208-12
mdbtools: Multiple Vulnerabilities (GLSA 202208-12) — Gentoo securityThird Party Advisory
-
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36187
36187 - mdbtools:fuzz_mdb: Dynamic-stack-buffer-overflow in mdb_numeric_to_string - oss-fuzzExploit;Issue Tracking;Third Party Advisory
Products affected by CVE-2021-45927
- cpe:2.3:a:mdbtools_project:mdbtools:0.9.2:*:*:*:*:*:*:*