Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8244

Опубликовано: 30 авг. 2020
Источник: debian
EPSS Низкий

Описание

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-blfixed4.0.3-1package
node-blfixed1.1.2-1+deb10u1busterpackage

Примечания

  • https://hackerone.com/reports/966347

  • https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190

EPSS

Процентиль: 58%
0.00368
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 5 лет назад

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

CVSS3: 6.5
redhat
больше 5 лет назад

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

CVSS3: 6.5
nvd
больше 5 лет назад

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

CVSS3: 6.5
github
больше 5 лет назад

Remote Memory Exposure in bl

EPSS

Процентиль: 58%
0.00368
Низкий