
Cloud Vulnerability DB
A community-led vulnerabilities database
Grok versions 7.6.6 through 9.2.0 contain a heap-based buffer overflow vulnerability in the grk::FileFormatDecompress::applypaletteclr function (called from grk::FileFormatDecompress::applyColour). The vulnerability was discovered and disclosed in April 2021 (OSS-Fuzz).
The vulnerability is classified as a heap-based buffer overflow WRITE vulnerability of 16 bytes occurring in the grk::FileFormatDecompress::applypaletteclr function, which is called from grk::FileFormatDecompress::applyColour. The issue was identified through the OSS-Fuzz project and has been assigned a HIGH severity rating (OSS-Fuzz-Vulns).
A successful exploitation of this heap buffer overflow vulnerability could potentially lead to arbitrary code execution or system crashes, as heap buffer overflows typically allow attackers to corrupt memory and potentially execute malicious code (OSS-Fuzz-Vulns).
Users should upgrade to a version newer than 9.2.0 to mitigate this vulnerability. The issue has been addressed in subsequent releases of Grok (Grok-Releases).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."