Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mf6x-7mm4-x2g7

Опубликовано: 20 июн. 2019
Источник: github
Github: Прошло ревью

Описание

Out-of-bounds Read in stringstream

All versions of stringstream are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.

Recommendation

No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to stringstream.

Пакеты

Наименование

stringstream

npm
Затронутые версииВерсия исправления

< 0.0.6

0.0.6

EPSS

Процентиль: 57%
0.0036
Низкий

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 4 лет назад

Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).

CVSS3: 6.5
redhat
около 5 лет назад

Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).

CVSS3: 6.5
nvd
больше 4 лет назад

Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).

CVSS3: 6.5
debian
больше 4 лет назад

Versions less than 0.0.6 of the Node.js stringstream module are vulner ...

EPSS

Процентиль: 57%
0.0036
Низкий

Дефекты

CWE-125