CVE-2020-8244

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
References
Link Resource
https://hackerone.com/reports/966347 Exploit Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html Mailing List Third Party Advisory
https://hackerone.com/reports/966347 Exploit Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://hackerone.com/reports/966347 - Exploit, Patch, Third Party Advisory () https://hackerone.com/reports/966347 - Exploit, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html - Mailing List, Third Party Advisory

Information

Published : 2020-08-30 15:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8244

Mitre link : CVE-2020-8244

CVE.ORG link : CVE-2020-8244


JSON object : View

Products Affected

bufferlist_project

  • bufferlist

debian

  • debian_linux
CWE
CWE-126

Buffer Over-read

CWE-125

Out-of-bounds Read