CVE-2026-33666

Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is completely bypassed. The code then reads len bytes (512 MB) from a buffer that is only a few bytes long, causing a segmentation fault. This vulnerability is fixed in 2.18.1.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:nds-association:zserio:*:*:*:*:*:*:*:*

History

28 Apr 2026, 18:32

Type Values Removed Values Added
CPE cpe:2.3:a:nds-association:zserio:*:*:*:*:*:*:*:*
First Time Nds-association
Nds-association zserio
References () https://github.com/ndsev/zserio/security/advisories/GHSA-fjwv-6wcr-vqwj - () https://github.com/ndsev/zserio/security/advisories/GHSA-fjwv-6wcr-vqwj - Exploit, Mitigation, Vendor Advisory

27 Apr 2026, 14:16

Type Values Removed Values Added
References () https://github.com/ndsev/zserio/security/advisories/GHSA-fjwv-6wcr-vqwj - () https://github.com/ndsev/zserio/security/advisories/GHSA-fjwv-6wcr-vqwj -

24 Apr 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 19:17

Updated : 2026-04-28 18:32


NVD link : CVE-2026-33666

Mitre link : CVE-2026-33666

CVE.ORG link : CVE-2026-33666


JSON object : View

Products Affected

nds-association

  • zserio
CWE
CWE-190

Integer Overflow or Wraparound