CVE Vulnerabilities

CVE-2020-8244

Buffer Over-read

Published: Aug 30, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
BufferlistBufferlist_project*1.2.3 (excluding)
BufferlistBufferlist_project2.0.0 (including)2.2.1 (excluding)
BufferlistBufferlist_project3.0.0 (including)3.0.1 (excluding)
BufferlistBufferlist_project4.0.0 (including)4.0.3 (excluding)
Node-blUbuntubionic*
Node-blUbuntuesm-apps/bionic*
Node-blUbuntuesm-apps/focal*
Node-blUbuntuesm-apps/xenial*
Node-blUbuntufocal*
Node-blUbuntutrusty*
Node-blUbuntuupstream*
Node-blUbuntuxenial*

References