First published: Tue Aug 02 2022(Updated: )
The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Socket Socket.io-client Java | <2.0.1 |
https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b
https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-25867.
The severity of CVE-2022-25867 is high with a severity value of 7.5.
The affected software by CVE-2022-25867 is the package io.socket:socket.io-client before version 2.0.1.
CVE-2022-25867 is a vulnerability in the package io.socket:socket.io-client before 2.0.1 that allows for a NULL pointer dereference when parsing a packet with an invalid payload format.
To fix CVE-2022-25867, it is recommended to update the package io.socket:socket.io-client to version 2.0.1 or later.