CVE-2021-33797
Summary
| CVE | CVE-2021-33797 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-17 22:15:00 UTC |
| Updated | 2023-04-26 23:05:00 UTC |
| Description | Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d. |
Risk And Classification
Problem Types: CWE-190
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Issue #148: Check for overflow when reading floating point exponent. · ccxvii/mujs@833b6f1 · GitHub | MISC | github.com | |
| global-buffer-overflow in jsdtoa.c:729. (The issue exists in all versions) · Issue #148 · ccxvii/mujs · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 183953 Debian Security Update for mujs (CVE-2021-33797)