All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 | third party advisory exploit |
https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192 | third party advisory broken link |