Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-39131
HistoryAug 17, 2021 - 7:55 p.m.

CVE-2021-39131 Improper Handling of Unexpected Data Type in ced

2021-08-1719:55:09
CWE-241
GitHub_M
www.cve.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

64.5%

ced detects character encoding using Google’s compact_enc_det library. In ced v0.1.0, passing data types other than Buffer causes the Node.js process to crash. The problem has been patched in ced v1.0.0. As a workaround, before passing an argument to ced, verify it’s a Buffer using Buffer.isBuffer(obj).

CNA Affected

[
  {
    "product": "ced",
    "vendor": "sonicdoe",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.0.0"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

64.5%

Related for CVELIST:CVE-2021-39131