Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-33797

Опубликовано: 17 апр. 2023
Источник: debian

Описание

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mujsfixed1.1.3-2package
mujsfixed1.1.0-1+deb11u3bullseyepackage

Примечания

  • https://github.com/ccxvii/mujs/issues/148

  • https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550 (1.1.2)

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 3 года назад

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.

CVSS3: 9.8
nvd
почти 3 года назад

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.

CVSS3: 9.8
github
почти 3 года назад

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.