CVE-2021-41499:
Classic Buffer Overflow in pyo
7.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
1/7/2022
Updated
2/1/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pyo | pip | < 1.0.3 | 1.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems directly from Server_debug's use of vsprintf with a fixed-size buffer. The GitHub issue explicitly shows the code pattern: vsprintf(buffer, format, args) where buffer is 256 bytes and format includes user-controlled filename input. This matches CWE-120's classic buffer overflow pattern. While Server_start_rec_internal passes the filename to Server_debug, the actual unsafe buffer operation occurs within Server_debug itself. The combination of external input control (filename), fixed buffer size, and unsafe vsprintf usage provides high confidence in this assessment.