Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-66453

Опубликовано: 03 дек. 2025
Источник: debian

Описание

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rhinounfixedpackage
rhinono-dsatrixiepackage
rhinono-dsabookwormpackage
rhinopostponedbullseyepackage

Примечания

  • https://github.com/mozilla/rhino/security/advisories/GHSA-3w8q-xq97-5j7x

  • Fixed by: https://github.com/mozilla/rhino/commit/b333c3ec7a86409d62b0aab315129584fe18cb9e (Rhino1_7_15_1_Release)

  • Fixed by: https://github.com/mozilla/rhino/commit/2bcf4c43deace35f1f57d86377c6767b0608986e (Rhino1_7_14_1_Release)

  • Merge conflict has been resolved as part of https://github.com/mozilla/rhino/commit/0ff0bbebde8b7606428041db47d89629a922464d (Rhino1_7_14_1_Release)

Связанные уязвимости

ubuntu
2 месяца назад

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

nvd
2 месяца назад

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

suse-cvrf
около 2 месяцев назад

Security update for rhino

github
2 месяца назад

Rhino has high CPU usage and potential DoS when passing specific numbers to `toFixed()` function