Out-of-bounds Read Affecting tarantool package, versions <1.7.2.385.g952d79e-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.13% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-TARANTOOL-1560288
  • published23 Dec 2016
  • disclosed23 Dec 2016

Introduced: 23 Dec 2016

CVE-2016-9037  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Debian:12 tarantool to version 1.7.2.385.g952d79e-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tarantool package and not the tarantool package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

An exploitable out-of-bounds array access vulnerability exists in the xrow_header_decode function of Tarantool 1.7.2.0-g8e92715. A specially crafted packet can cause the function to access an element outside the bounds of a global array that is used to determine the type of the specified key's value. This can lead to an out of bounds read within the context of the server. An attacker who exploits this vulnerability can cause a denial of service vulnerability on the server.

CVSS Base Scores

version 3.1