napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://hackerone.com/reports/784186 | third party advisory exploit |
https://www.oracle.com/security-alerts/cpuoct2020.html | third party advisory patch |
https://security.gentoo.org/glsa/202101-07 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20201023-0003/ | third party advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |