Lucene search

K
nvd[email protected]NVD:CVE-2021-33797
HistoryApr 17, 2023 - 10:15 p.m.

CVE-2021-33797

2023-04-1722:15:07
CWE-119
CWE-190
web.nvd.nist.gov
4
artifex mujs
integer overflow
buffer-overflow
vulnerability
jsdtoa.c
js_strtod()
floating point exponent
pointer *

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.001

Percentile

44.5%

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.

Affected configurations

Nvd
Node
artifexmujsRange1.0.11.1.1
VendorProductVersionCPE
artifexmujs*cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.001

Percentile

44.5%