First published: Thu May 24 2018(Updated: )
An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JerryScript | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11418 is classified as a medium severity vulnerability due to the potential for a heap-based buffer over-read.
To fix CVE-2018-11418, you should upgrade to a patched version of JerryScript that addresses the heap-based buffer over-read issue.
The implications of CVE-2018-11418 include the potential for unauthorized access to sensitive information due to a heap-based buffer over-read.
CVE-2018-11418 specifically affects JerryScript version 1.0.
As of the last update, there are no publicly disclosed exploits for CVE-2018-11418, but the vulnerability should still be addressed.