Buffer overrun in Google Cloud IoT Device SDK for Embedded C
CVE-2021-22547
6.3MEDIUM
Key Information:
- Vendor
- Vendor
- CVE Published:
- 4 May 2021
Summary
In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.
Affected Version(s)
Google Cloud IoT Device SDK for Embedded C <= 1.0.2
References
CVSS V3.1
Score:
6.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved