OTFCC commit 617837b was discovered to contain a global buffer overflow via /release-x64/otfccdump+0x718693.
References
Link | Resource |
---|---|
https://drive.google.com/file/d/1Aer3pVGg3ZZrdlGOfMhdnSqAjOQj_3xK/view?usp=sharing | Permissions Required Third Party Advisory |
https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md | Exploit Third Party Advisory |
https://drive.google.com/file/d/1Aer3pVGg3ZZrdlGOfMhdnSqAjOQj_3xK/view?usp=sharing | Permissions Required Third Party Advisory |
https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://drive.google.com/file/d/1Aer3pVGg3ZZrdlGOfMhdnSqAjOQj_3xK/view?usp=sharing - Permissions Required, Third Party Advisory | |
References | () https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md - Exploit, Third Party Advisory |
Information
Published : 2022-09-22 17:15
Updated : 2024-11-21 07:10
NVD link : CVE-2022-35021
Mitre link : CVE-2022-35021
CVE.ORG link : CVE-2022-35021
JSON object : View
Products Affected
otfcc_project
- otfcc
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')