Vulnerability CVE-2020-17360


Published: 2020-08-12

Description:
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Noise-Java AESGCMOnCtrCipherState.encryptWithAd() Insufficient Boundary Checks
Pietro Oliva
05.09.2020
Med.
Noise-Java AESGCMFallbackCipherState.encryptWithAd() Insufficient Boundary Checks
Pietro Oliva
05.09.2020
Med.
Noise-Java ChaChaPolyCipherState.encryptWithAd() Insufficient Boundary Checks
Pietro Oliva
05.09.2020

Type:

CWE-190

(Integer Overflow or Wraparound)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Readytalk -> Avian 

 References:
http://seclists.org/fulldisclosure/2020/Aug/8
https://github.com/ReadyTalk/avian/issues

Copyright 2024, cxsecurity.com

 

Back to Top