Buffer overrun in Google Cloud IoT Device SDK for Embedded C
CVE-2021-22547

6.3MEDIUM

Key Information:

Vendor
Google
Vendor
CVE Published:
4 May 2021

Summary

In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.

Affected Version(s)

Google Cloud IoT Device SDK for Embedded C <= 1.0.2

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.