
Cloud Vulnerability DB
A community-led vulnerabilities database
Ming 0.4.8 contains an out-of-bounds buffer overwrite vulnerability in the getName() function within the decompiler.c file. The vulnerability was discovered in August 2020 and was assigned CVE-2021-34338. This security flaw affects the Ming library, specifically version 0.4.8, and impacts systems where this software is deployed (AttackerKB, RedHat Bugzilla).
The vulnerability is characterized by an out-of-bounds buffer overwrite issue in the getName() function located in util/decompile.c at line 457. When triggered, it results in a direct segmentation fault. The vulnerability has been assigned a CVSS v3.1 Base Score of 6.5 (Medium), with an Impact Score of 3.6 and Exploitability Score of 2.8. The attack vector is network-based, requires low attack complexity, needs no privileges, but does require user interaction (AttackerKB).
The primary impact of this vulnerability is a denial of service condition through segmentation fault when the affected function is triggered. The CVSS metrics indicate no impact on confidentiality or integrity, but a high impact on availability (AttackerKB).
The issue has been reported to the upstream project through their GitHub repository. Users are advised to monitor for updates from their respective distribution vendors (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."