Описание
njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call.
Ссылки
- Permissions RequiredThird Party Advisory
- ExploitThird Party Advisory
- Permissions RequiredThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.3.3 (включая)
cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00288
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 6.5
github
больше 3 лет назад
njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call.
CVSS3: 6.5
fstec
больше 6 лет назад
Уязвимость интерпретатора njs сервера nginx, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 52%
0.00288
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125