6.5
CVE-2020-8244
- EPSS 0.37%
- Published 30.08.2020 15:15:12
- Last modified 21.11.2024 05:38:34
- Source support@hackerone.com
- CVE-Watchlists
- Open
A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
Data is provided by the National Vulnerability Database (NVD)
Bufferlist Project ≫ Bufferlist SwPlatformnode.js Version < 1.2.3
Bufferlist Project ≫ Bufferlist SwPlatformnode.js Version >= 2.0.0 < 2.2.1
Bufferlist Project ≫ Bufferlist SwPlatformnode.js Version >= 3.0.0 < 3.0.1
Bufferlist Project ≫ Bufferlist SwPlatformnode.js Version >= 4.0.0 < 4.0.3
Debian ≫ Debian Linux Version9.0
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.37% | 0.58 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
|
| nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:P
|
CWE-125 Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.
CWE-126 Buffer Over-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.