First published: Sat Nov 12 2016(Updated: )
Artifex Software, Inc. MuJS before 5008105780c0b0182ea6eda83ad5598f225be3ee allows context-dependent attackers to conduct "denial of service (application crash)" attacks by using the "malformed labeled break/continue in JavaScript" approach, related to a "NULL pointer dereference" issue affecting the jscompile.c component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MuJS | <2016-10-26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9294 is classified as a moderate severity vulnerability that can lead to denial of service attacks.
To fix CVE-2016-9294, upgrade to a version of MuJS released after the commit identified by hash 5008105780c0b0182ea6eda83ad5598f225be3ee.
CVE-2016-9294 affects systems using the MuJS JavaScript interpreter prior to the specified commit.
The impact of CVE-2016-9294 includes potential application crashes due to malformed input leading to a NULL pointer dereference.
Yes, CVE-2016-9294 can be exploited by context-dependent attackers who provide crafted JavaScript code.