All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory.
References
Link | Resource |
---|---|
https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192 | Broken Link Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-06-17 20:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-25872
Mitre link : CVE-2022-25872
CVE.ORG link : CVE-2022-25872
JSON object : View
Products Affected
fast_string_search_project
- fast_string_search
CWE
CWE-125
Out-of-bounds Read