CVE-2021-33797Improper Restriction of Operations within the Bounds of a Memory Buffer in Mujs

Severity
9.8CRITICALNVD
EPSS
0.1%
top 66.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 17
Latest updateApr 18

Description

Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Debianartifex/mujs< 1.1.0-1+deb11u3+3
NVDartifex/mujs1.0.11.1.1
CVEListV5artifex/mujsmujs in versions 1.0.1 to 1.1.1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-cm79-jwwm-5h7h: Buffer-overflow in jsdtoa2023-04-18
OSV
CVE-2021-33797: Buffer-overflow in jsdtoa2023-04-17
CVEList
CVE-2021-33797: Buffer-overflow in jsdtoa2023-04-17

📋Vendor Advisories

1
Debian
CVE-2021-33797: mujs - Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integ...2021
CVE-2021-33797 — Artifex Mujs vulnerability | cvebase