Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because of a missing check for stack exhaustion with many '{' characters in jsparse.c.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Link | Tags |
---|---|
https://github.com/espruino/Espruino/commit/51380baf17241728b6d48cdb84140b931e3e3cc5 | patch vendor advisory |
https://github.com/espruino/Espruino/issues/1448 | issue tracking vendor advisory |