Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-27934
HistoryMar 14, 2024 - 10:53 p.m.

Design/Logic Flaw

2024-03-1422:53:56
PRIOn knowledge base
www.prio-n.com
17
deno
javascript
typescript
webassembly
logic flaw
use-after-free
code execution
security vulnerability

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to version 1.40.3, use of inherently unsafe *const c_void and ExternalPointer leads to use-after-free access of the underlying structure, resulting in arbitrary code execution. Use of inherently unsafe *const c_void and ExternalPointer leads to use-after-free access of the underlying structure, which is exploitable by an attacker controlling the code executed inside a Deno runtime to obtain arbitrary code execution on the host machine regardless of permissions. This bug is known to be exploitable for both *const c_void and ExternalPointer implementations. Version 1.40.3 fixes this issue.

CPENameOperatorVersion
denoeq= >= 1.36.2, < 1.40.3

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for PRION:CVE-2024-27934