First published: Tue Dec 04 2018(Updated: )
In LibSass prior to 3.5.5, Sass::Eval::operator()(Sass::Binary_Expression*) inside eval.cpp allows attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, because of certain incorrect parsing of '%' as a modulo operator in parser.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libsass | <3.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-19837.
The severity of CVE-2018-19837 is medium with a CVSS score of 6.5.
The Sass-lang Libsass software with versions up to and excluding 3.5.5 is affected by CVE-2018-19837.
An attacker can exploit CVE-2018-19837 by using a crafted sass file that triggers a denial-of-service due to stack consumption.
Yes, updating the Sass-lang Libsass software to version 3.5.5 or newer fixes CVE-2018-19837.