Vulnerability Description
A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jerryscript | Jerryscript | < 2021-10-15 |
Related Weaknesses (CWE)
References
- https://github.com/jerryscript-project/jerryscript/issues/4793ExploitPatchThird Party Advisory
- https://github.com/jerryscript-project/jerryscript/pull/4794PatchThird Party Advisory
- https://github.com/jerryscript-project/jerryscript/issues/4793ExploitPatchThird Party Advisory
- https://github.com/jerryscript-project/jerryscript/pull/4794PatchThird Party Advisory
FAQ
What is CVE-2021-42863?
CVE-2021-42863 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size.
How severe is CVE-2021-42863?
CVE-2021-42863 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-42863?
Check the references section above for vendor advisories and patch information. Affected products include: Jerryscript Jerryscript.