Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h79r-6v3m-rwjv

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\0", which triggers a buffer overflow and over-read.

The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\0", which triggers a buffer overflow and over-read.

EPSS

Процентиль: 77%
0.01017
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 10 лет назад

The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\\0", which triggers a buffer overflow and over-read.

EPSS

Процентиль: 77%
0.01017
Низкий

Дефекты

CWE-119