First published: Thu May 31 2018(Updated: )
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Espruino Espruino | <1.98 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-11591 and the title is Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing.
The severity of CVE-2018-11591 is medium with a severity value of 5.5.
Attackers can exploit CVE-2018-11591 by causing a denial of service (application crash) using a user crafted input file.
CVE-2018-11591 was addressed by adding validation for a debug trace print statement in jsvar.c.
Yes, you can find additional information for CVE-2018-11591 on the GitHub page of Espruino.