CVE-2021-44490

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause a denial-of-service (DoS) by crashing YottaDB applications through crafted input that triggers an integer miscalculation in memory allocation. Attackers can exploit this to cause segmentation faults and application crashes. Affected users include anyone running vulnerable versions of YottaDB or V7.0-000.

💻 Affected Systems

Products:
  • YottaDB
  • V7.0-000
Versions: YottaDB through r1.32 and V7.0-000
Operating Systems: All supported platforms (Linux, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through application crashes, potentially affecting database availability and dependent applications.

🟠

Likely Case

Denial-of-service through application crashes, requiring restart of affected YottaDB processes.

🟢

If Mitigated

Limited impact if proper input validation and access controls prevent malicious input from reaching vulnerable code.

🌐 Internet-Facing: MEDIUM - While exploitation requires crafted input, internet-facing applications could be targeted for DoS attacks.
🏢 Internal Only: MEDIUM - Internal applications could be crashed by authenticated users or through other attack vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted input to trigger the vulnerable code path, but no public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: YottaDB r1.34 and later, V7.0-001 and later

Vendor Advisory: https://gitlab.com/YottaDB/DB/YDB/-/issues/828

Restart Required: Yes

Instructions:

1. Download latest YottaDB release from official repository. 2. Follow installation instructions for your platform. 3. Restart all YottaDB processes and dependent applications.

🔧 Temporary Workarounds

Input validation

all

Implement strict input validation to prevent crafted input from reaching the vulnerable op_fnj3 function.

Access controls

all

Restrict access to YottaDB applications to trusted users only.

🧯 If You Can't Patch

  • Implement network segmentation to isolate YottaDB systems from untrusted networks
  • Deploy application-level firewalls or WAFs to filter suspicious input patterns

🔍 How to Verify

Check if Vulnerable:

Check YottaDB version: yottadb -version | grep 'YottaDB release'

Check Version:

yottadb -version

Verify Fix Applied:

Verify version is r1.34+ or V7.0-001+ after patching

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in application logs
  • Unexpected YottaDB process crashes
  • Core dump files in working directories

Network Indicators:

  • Unusual input patterns to YottaDB applications
  • Sudden loss of database connectivity

SIEM Query:

source="yottadb.log" AND ("segmentation fault" OR "SIGSEGV" OR "core dumped")

🔗 References

📤 Share & Export