Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Escalation of Privileges with a user crafted input file via a Buffer Overflow during syntax parsing, because strncat is misused.
References
Link | Resource |
---|---|
https://github.com/espruino/Espruino/issues/1425 | Issue Tracking Vendor Advisory |
https://github.com/espruino/Espruino/files/2019220/test_4.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/files/2019216/test_2.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/files/2019210/test_0.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/commit/0a7619875bf79877907205f6bee08465b89ff10b | Patch Vendor Advisory |
Configurations
Information
Published : 2018-05-31 09:29
Updated : 2018-06-08 09:17
NVD link : CVE-2018-11595
Mitre link : CVE-2018-11595
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
espruino
- espruino