CVE编号
CVE-2018-1000636利用情况
暂无补丁情况
官方补丁披露时间
2018-08-21漏洞描述
JerryScript version Tested on commit f86d7459d195c8ba58479d1861b0cc726c8b3793. Analysing history it seems that the issue has been present since commit 64a340ffeb8809b2b66bbe32fd443a8b79fdd860 contains a CWE-476: NULL Pointer Dereference vulnerability in Triggering undefined behavior at jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:598 (passing NULL to memcpy as 2nd argument) results in null pointer dereference (segfault) at jerry-core/jmem/jmem-heap.c:463 that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute specially crafted javascript code. This vulnerability appears to have been fixed in after commit 87897849f6879df10e8ad68a41bf8cf507edf710.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/jerryscript-project/jerryscript/issues/2435 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | jerryscript | jerryscript | 1.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | iotjs | * |
Up to (excluding) 1.0-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | iotjs | * |
Up to (excluding) 1.0+715-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | iotjs | * |
Up to (excluding) 1.0+715-1 |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...