CVE-2022-25867

The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
Configurations

Configuration 1 (hide)

cpe:2.3:a:socket:socket.io-client_java:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
References () https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b - Patch, Third Party Advisory () https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b - Patch, Third Party Advisory
References () https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284 - Patch, Third Party Advisory () https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284 - Patch, Third Party Advisory
References () https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 - Third Party Advisory () https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 - Third Party Advisory
References () https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1 - Release Notes, Third Party Advisory () https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1 - Release Notes, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 - Exploit, Issue Tracking, Patch, Release Notes, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 - Exploit, Issue Tracking, Patch, Release Notes, Third Party Advisory

Information

Published : 2022-08-02 14:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-25867

Mitre link : CVE-2022-25867

CVE.ORG link : CVE-2022-25867


JSON object : View

Products Affected

socket

  • socket.io-client_java
CWE
CWE-476

NULL Pointer Dereference