CVE-2021-44483

7.5 HIGH

📋 TL;DR

This vulnerability in YottaDB allows attackers to crash applications by triggering a divide-by-zero error through improper input validation. It affects all users running vulnerable versions of YottaDB, potentially disrupting database operations and dependent services.

💻 Affected Systems

Products:
  • YottaDB
Versions: All versions through r1.32 and V7.0-000
Operating Systems: All platforms supported by YottaDB
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using YottaDB's eb_div function is vulnerable. The vulnerability is in the core database engine.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service causing application crashes, database unavailability, and disruption of critical business processes relying on YottaDB.

🟠

Likely Case

Application crashes leading to service interruptions, requiring manual restarts and potentially causing data inconsistency if transactions are interrupted.

🟢

If Mitigated

Limited impact with proper input validation at application layer, but still vulnerable to malicious internal users or compromised applications.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires specific API calls, internet-facing applications using YottaDB could be targeted if those endpoints are exposed.
🏢 Internal Only: HIGH - Internal applications and services using YottaDB are vulnerable to both malicious insiders and compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to call the vulnerable eb_div function, which typically requires application-level access. The vulnerability is straightforward to trigger once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after r1.32 and V7.0-000

Vendor Advisory: https://gitlab.com/YottaDB/DB/YDB/-/issues/828

Restart Required: Yes

Instructions:

1. Upgrade YottaDB to version r1.34 or later (or V7.0-001 or later for V7.0 series). 2. Restart all applications and services using YottaDB. 3. Verify the fix by checking version and testing previously vulnerable functionality.

🔧 Temporary Workarounds

Input validation wrapper

all

Add input validation in application code to check for zero denominators before calling YottaDB division functions

# Application-specific code required - no universal command

🧯 If You Can't Patch

  • Implement strict input validation at application layer to prevent zero values from reaching YottaDB division operations
  • Isolate YottaDB instances, restrict access to only trusted applications, and monitor for crash events

🔍 How to Verify

Check if Vulnerable:

Check YottaDB version: ydb_dir/gtm_dist/mumps -version | grep 'YottaDB release'

Check Version:

$ydb_dist/mumps -version

Verify Fix Applied:

Verify version is r1.34+ or V7.0-001+, then test division operations with zero denominators to ensure graceful error handling

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with division-related errors
  • YottaDB process termination logs
  • Core dumps in YottaDB working directories

Network Indicators:

  • Sudden drop in database connections
  • Increased error responses from applications using YottaDB

SIEM Query:

source="yottadb.log" AND ("divide by zero" OR "SIGFPE" OR "floating point exception")

🔗 References

📤 Share & Export