Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nds-association
Nds-association zserio |
|
| CPEs | cpe:2.3:a:nds-association:zserio:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nds-association
Nds-association zserio |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ndsev
Ndsev zserio |
|
| Vendors & Products |
Ndsev
Ndsev zserio |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is completely bypassed. The code then reads len bytes (512 MB) from a buffer that is only a few bytes long, causing a segmentation fault. This vulnerability is fixed in 2.18.1. | |
| Title | Zserio: Integer Overflow in BitStreamReader on 32-bit platforms | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-27T13:46:01.833Z
Reserved: 2026-03-23T15:23:42.220Z
Link: CVE-2026-33666
Updated: 2026-04-27T13:45:47.937Z
Status : Analyzed
Published: 2026-04-24T19:17:10.147
Modified: 2026-04-28T18:32:02.533
Link: CVE-2026-33666
No data.
OpenCVE Enrichment
Updated: 2026-04-28T13:45:06Z