The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 | issue tracking release notes patch exploit third party advisory |
https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 | third party advisory |
https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284 | third party advisory patch |
https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b | third party advisory patch |
https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1 | third party advisory release notes |