First published: Thu May 31 2018(Updated: )
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Espruino Espruino | <1.98 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11592 is a vulnerability in Espruino before version 1.98 that allows attackers to cause a denial of service (application crash) by exploiting an out-of-bounds read during syntax parsing.
CVE-2018-11592 has a severity score of 5.5 (medium).
This vulnerability can be exploited by providing a user crafted input file that triggers an out-of-bounds read.
Yes, a fix for CVE-2018-11592 is available in Espruino version 1.98 and later.
You can find more information about CVE-2018-11592 at the following references: [reference_1](https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e), [reference_2](https://github.com/espruino/Espruino/files/2015630/test_0.txt), [reference_3](https://github.com/espruino/Espruino/issues/1421).