Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/espruino/Espruino/files/2019228/eh_0.txt | vendor advisory exploit |
https://github.com/espruino/Espruino/issues/1426 | vendor advisory issue tracking |
https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018 | patch vendor advisory |