CVE-2020-8244

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
References
Link Resource
https://hackerone.com/reports/966347 Exploit Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2020-08-30 08:15

Updated : 2022-05-24 10:31


NVD link : CVE-2020-8244

Mitre link : CVE-2020-8244


JSON object : View

CWE
CWE-125

Out-of-bounds Read

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

bufferlist_project

  • bufferlist