CVE-2020-8244

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
References
Link Resource
https://hackerone.com/reports/966347 Exploit Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-08-30 15:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-8244

Mitre link : CVE-2020-8244

CVE.ORG link : CVE-2020-8244


JSON object : View

Products Affected

bufferlist_project

  • bufferlist

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read

CWE-126

Buffer Over-read