CVE-2020-17360

** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/ReadyTalk/avian/issues Third Party Advisory
http://seclists.org/fulldisclosure/2020/Aug/8 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/11 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/14 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/13 Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:readytalk:avian:1.2.0:*:*:*:*:*:*:*

Information

Published : 2020-08-12 11:15

Updated : 2021-12-16 10:29


NVD link : CVE-2020-17360

Mitre link : CVE-2020-17360


JSON object : View

CWE
CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write

CWE-190

Integer Overflow or Wraparound

Advertisement

dedicated server usa

Products Affected

readytalk

  • avian