2021-10-22 11:23:56
icscert
PUBLISHED
Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.