First published: Thu May 12 2022(Updated: )
A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jerryscript Jerryscript | <2021-10-15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42863 is a buffer overflow vulnerability in ecma_builtin_typedarray_prototype_filter() in JerryScript.
CVE-2021-42863 has a severity rating of 9.8 out of 10, making it critical.
CVE-2021-42863 affects JerryScript versions up to and excluding 2021-10-15.
An attacker can exploit CVE-2021-42863 by constructing a fake object or a fake arraybuffer with unlimited size.
Yes, you can find references for CVE-2021-42863 at the following links: [GitHub Issue](https://github.com/jerryscript-project/jerryscript/issues/4793) and [GitHub Pull Request](https://github.com/jerryscript-project/jerryscript/pull/4794).