Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/espruino/Espruino/issues/1420 | vendor advisory issue tracking |
https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 | patch vendor advisory |
https://github.com/espruino/Espruino/files/2015612/test.txt | vendor advisory exploit |