First published: Fri Apr 24 2020(Updated: )
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Whoopsie Project Whoopsie | <=0.2.69 | |
Mongodb C Driver | <0.8 | |
debian/duo-unix | <=1.11.3-1<=1.11.3-1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-12135.
The severity level of CVE-2020-12135 is medium.
The affected software includes duo-unix (versions up to and including 1.9.21-1.1 and 1.11.3-1) and whoopsie (versions up to and including 0.2.71) on Ubuntu and Debian systems, as well as the mongodb-c-driver (version up to 0.8).
CVE-2020-12135 is a vulnerability in bson before 0.8 where it incorrectly uses int rather than size_t for many variables, parameters, and return values, potentially leading to an integer overflow.
There are no specific fixes available for CVE-2020-12135 at this time, but it is recommended to update the affected software to the latest versions to mitigate the risk.