漏洞标题
N/A
漏洞描述信息
在提交f86d7459d195c8ba58479d1861b0cc726c8b3793上进行测试的JerryScript版本。 从历史记录来看,该问题自提交64a340ffeb8809b2b66bbe32fd443a8b79fdd860以来一直存在,其中包含一个CWE-476: NULL Pointer Dereference漏洞,在触发 Jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:598(将 NULL 传递给 memcpy 作为第二个参数)时会导致 null pointer dereference (segfault) 并在 Jerry-core/jmem/jmem-heap.c:463 引起Segmentation Fault,可能导致崩溃。这种攻击似乎可以通过执行 victim 执行 specially crafted javascript 代码来利用。这个漏洞似乎在提交87897849f6879df10e8ad68a41bf8cf507edf710之后被修复。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
JerryScript version Tested on commit f86d7459d195c8ba58479d1861b0cc726c8b3793. Analysing history it seems that the issue has been present since commit 64a340ffeb8809b2b66bbe32fd443a8b79fdd860 contains a CWE-476: NULL Pointer Dereference vulnerability in Triggering undefined behavior at jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:598 (passing NULL to memcpy as 2nd argument) results in null pointer dereference (segfault) at jerry-core/jmem/jmem-heap.c:463 that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute specially crafted javascript code. This vulnerability appears to have been fixed in after commit 87897849f6879df10e8ad68a41bf8cf507edf710.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
JerryScript 安全漏洞
漏洞描述信息
JerryScript是一款轻量级的JavaScript引擎。 JerryScript commit 64a340ffeb8809b2b66bbe32fd443a8b79fdd860及之后版本中的jerry-core/jmem/jmem-heap.c文件存在安全漏洞。攻击者可借助特制的JavaScript代码利用该漏洞造成拒绝服务(空指针逆向引用和崩溃)。
CVSS信息
N/A
漏洞类别
授权问题