CVE-2020-8244

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
References
Link Resource
https://hackerone.com/reports/966347 Exploit Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*
cpe:2.3:a:bufferlist_project:bufferlist:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

24 May 2022, 17:31

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2020-08-30 15:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-8244

Mitre link : CVE-2020-8244

CVE.ORG link : CVE-2020-8244


JSON object : View

Products Affected

debian

  • debian_linux

bufferlist_project

  • bufferlist
CWE
CWE-125

Out-of-bounds Read

CWE-126

Buffer Over-read