{"id":"CVE-2021-44509","details":"An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application.","modified":"2026-03-13T05:15:04.461397Z","published":"2022-04-15T18:15:09.463Z","references":[{"type":"ADVISORY","url":"http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html"},{"type":"ADVISORY","url":"https://sourceforge.net/projects/fis-gtm/files/"},{"type":"FIX","url":"https://gitlab.com/YottaDB/DB/YDB/-/issues/828"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/YottaDB/DB/YDB","events":[{"introduced":"0"},{"last_affected":"451ab4772089182d502d1758a83cb793c2913b63"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0-000"}]}}],"versions":["V4.2-002","V4.3-000","V4.3-001A","V4.3-001B","V4.3-001D","V4.3-001E","V4.4-002","V4.4-003","V4.4-004","V4.4-FT01","V5.0-000","V5.0-000C","V5.0-000D","V5.1-000","V5.2-000","V5.2-000A","V5.2-000B","V5.2-001","V5.3-000","V5.3-001","V5.3-001A","V5.3-002","V5.3-003","V5.3-004","V5.3-004A","V5.4-000","V5.4-000A","V5.4-001","V5.4-002","V5.4-002A","V5.4-002B","V5.5-000","V6.0-000x64","V6.0-000x86","V6.0-001","V6.0-002","V6.0-003","V6.1-000","V6.2-000","V6.2-001","V6.2-002","V6.2-002A","V6.3-000","V6.3-000A","V6.3-001","V6.3-001A","V6.3-002","V6.3-003","V6.3-003A","V6.3-004","V6.3-005","V6.3-006","V6.3-007","V6.3-008","V6.3-009","V6.3-010","V6.3-011","V6.3-012","V6.3-013","V6.3-014","V7.0-000"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-44509.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}