The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
References
Link | Resource |
---|---|
https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b | Patch Third Party Advisory |
https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284 | Patch Third Party Advisory |
https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 | Third Party Advisory |
https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1 | Release Notes Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 | Exploit Issue Tracking Patch Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-08-02 14:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-25867
Mitre link : CVE-2022-25867
CVE.ORG link : CVE-2022-25867
JSON object : View
Products Affected
socket
- socket.io-client_java
CWE
CWE-476
NULL Pointer Dereference