Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c.
References
Link | Resource |
---|---|
https://github.com/espruino/Espruino/issues/1437 | Issue Tracking Vendor Advisory |
https://github.com/espruino/Espruino/files/2025968/test_2.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/files/2025963/test_1.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/files/2025956/test_0.txt | Exploit Vendor Advisory |
https://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b | Patch Vendor Advisory |
Configurations
Information
Published : 2018-05-31 09:29
Updated : 2018-06-08 10:09
NVD link : CVE-2018-11598
Mitre link : CVE-2018-11598
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
espruino
- espruino