
Cloud Vulnerability DB
A community-led vulnerabilities database
Buffer Overflow vulnerability in Dvidelabs flatcc v.0.6.0 allows local attacker to execute arbitrary code via the fltacc execution of the error_ref_sym function. The vulnerability was discovered in the parser.c file where an integer overflow can lead to a stack buffer overflow (MITRE).
The vulnerability exists in the error_ref_sym function within parser.c. The issue occurs when handling the size variable 'k' which represents the remaining buffer space. When k becomes 0, a decrement operation (--k) causes an integer overflow. This overflow leads to an invalid size calculation for subsequent memcpy operations, potentially resulting in a stack buffer overflow (GitHub Issue).
A successful exploitation of this vulnerability could allow a local attacker to execute arbitrary code on the affected system through a specially crafted input that triggers the buffer overflow condition (MITRE).
Users should upgrade to a version of flatcc that contains the fix for this vulnerability. No specific workaround has been documented for users who cannot upgrade immediately.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."