A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.
References
Link | Resource |
---|---|
https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt | Patch Third Party Advisory |
https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f | Patch Third Party Advisory |
https://github.com/ccxvii/mujs/releases/tag/1.3.2 | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/ | |
https://www.debian.org/security/2022/dsa-5291 | Third Party Advisory |
https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt | Patch Third Party Advisory |
https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f | Patch Third Party Advisory |
https://github.com/ccxvii/mujs/releases/tag/1.3.2 | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/ | |
https://www.debian.org/security/2022/dsa-5291 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt - Patch, Third Party Advisory | |
References | () https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f - Patch, Third Party Advisory | |
References | () https://github.com/ccxvii/mujs/releases/tag/1.3.2 - Release Notes, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/ - | |
References | () https://www.debian.org/security/2022/dsa-5291 - Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MC6PLHTXHZ7GW7QQGTLBHLXL47UHTHXO/ - Mailing List, Third Party Advisory |
20 Dec 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Nov 2022, 20:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5291 - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
29 Nov 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Nov 2022, 19:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://github.com/ccxvii/mujs/releases/tag/1.3.2 - Release Notes, Third Party Advisory | |
References | (MISC) https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3544a0e9045e8a8c60561f - Patch, Third Party Advisory | |
References | (MISC) https://github.com/alalng/CVE-2022-44789/blob/main/PublicReferenceURL.txt - Patch, Third Party Advisory | |
CWE | CWE-119 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
24 Nov 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-23 21:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-44789
Mitre link : CVE-2022-44789
CVE.ORG link : CVE-2022-44789
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
artifex
- mujs
CWE
CWE-787
Out-of-bounds Write