First published: Thu Jul 25 2019(Updated: )
JerryScript commit 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 is affected by: Buffer Overflow. The impact is: denial of service and possibly arbitrary code execution. The component is: function lit_char_to_utf8_bytes (jerry-core/lit/lit-char-helpers.c:377). The attack vector is: executing crafted javascript code. The fixed version is: after commit 505dace719aebb3308a3af223cfaa985159efae0.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
JerryScript | <2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1010176 is considered critical due to its potential for denial of service and arbitrary code execution.
To fix CVE-2019-1010176, upgrade to a version of JerryScript that is 2.0 or higher.
CVE-2019-1010176 affects the function lit_char_to_utf8_bytes in the lit-char-helpers.c file.
Exploiting CVE-2019-1010176 can lead to denial of service and possibly allow an attacker to execute arbitrary code.
The attack vector for CVE-2019-1010176 involves executing crafted JavaScript code.