CVE-2021-47875

9.8 CRITICAL

📋 TL;DR

GeoGebra CAS Calculator 6.0.631.0 contains a buffer overflow vulnerability that allows attackers to crash the application by pasting a specially crafted payload into the input field. This affects all users running the vulnerable version of the calculator software. The vulnerability enables denial of service attacks against the calculator application.

💻 Affected Systems

Products:
  • GeoGebra CAS Calculator
Versions: 6.0.631.0
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 6.0.631.0 are vulnerable by default. The vulnerability is in the input handling mechanism.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash requiring restart, potential loss of unsaved work, and disruption of mathematical calculations in progress.

🟠

Likely Case

Application crash requiring manual restart, minor productivity disruption for users relying on the calculator.

🟢

If Mitigated

No impact if patched version is installed or if input validation prevents the exploit.

🌐 Internet-Facing: LOW - The calculator is typically a standalone desktop application not directly internet-exposed.
🏢 Internal Only: MEDIUM - Malicious users could crash the application on shared systems or disrupt other users' work.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires pasting 8000 repeated characters into the calculator input field. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.0.631.0

Vendor Advisory: https://www.geogebra.org

Restart Required: Yes

Instructions:

1. Open GeoGebra CAS Calculator. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install latest version. 4. Restart the application.

🔧 Temporary Workarounds

Input Validation Restriction

all

Limit input length in calculator field to prevent buffer overflow

Not applicable - requires code modification

Application Sandboxing

all

Run calculator in restricted environment to limit impact of crashes

Not applicable - configuration dependent

🧯 If You Can't Patch

  • Restrict calculator usage to trusted users only
  • Monitor for repeated application crashes and investigate source

🔍 How to Verify

Check if Vulnerable:

Check if GeoGebra CAS Calculator version is 6.0.631.0 in Help > About

Check Version:

Not applicable - check via application GUI Help > About

Verify Fix Applied:

Verify version is newer than 6.0.631.0 and test by pasting 8000 characters into input field

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • Unexpected termination events

Network Indicators:

  • Not applicable - local application only

SIEM Query:

EventID: 1000 OR EventID: 1001 (Application Error) AND ProcessName: GeoGebra.exe

🔗 References

📤 Share & Export