First published: Mon Apr 17 2023(Updated: )
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex MuJS | >=1.0.1<=1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow is CVE-2021-33797.
CVE-2021-33797 has a severity rating of 9.8 (critical).
Versions 1.0.1 to 1.1.1 of Artifex MuJS are affected by CVE-2021-33797.
The buffer overflow in CVE-2021-33797 occurs due to an integer overflow when reading the floating point exponent in js_strtod().
The latest version of Artifex MuJS (1.1.2 or later) contains a fix for the buffer overflow vulnerability CVE-2021-33797.