PT-2026-35968 · Wazuh · Wazuh
Marius-Momeu
·
Published
2026-04-29
·
Updated
2026-04-29
·
CVE-2026-41499
CVSS v3.1
6.5
Medium
| AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Wazuh versions 4.0.0 through 4.14.3
Description
Multiple heap-based out-of-bounds WRITE issues exist in the
parse uname string() function within remoted op.c. This function processes OS identification data from agents and contains a code pattern that writes to strlen(ptr) - 1 without verifying if strings are empty. When an empty string is processed, strlen() returns 0, causing an unsigned integer underflow where 0 - 1 wraps to SIZE MAX. This results in a write operation occurring 1 byte before the allocated buffer, which corrupts heap metadata, such as the chunk size field in glibc malloc, leading to heap corruption.Recommendations
Update to version 4.14.4.
Exploit
Fix
Integer Underflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Wazuh