CVE-2020-17360

An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link Resource
http://seclists.org/fulldisclosure/2020/Aug/8 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/11 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/13 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/14 Mailing List Third Party Advisory
https://github.com/ReadyTalk/avian/issues Third Party Advisory
http://seclists.org/fulldisclosure/2020/Aug/8 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/11 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/13 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Sep/14 Mailing List Third Party Advisory
https://github.com/ReadyTalk/avian/issues Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:readytalk:avian:1.2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:07

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2020/Aug/8 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Aug/8 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Sep/11 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Sep/11 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Sep/13 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Sep/13 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Sep/14 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Sep/14 - Mailing List, Third Party Advisory
References () https://github.com/ReadyTalk/avian/issues - Third Party Advisory () https://github.com/ReadyTalk/avian/issues - Third Party Advisory

07 Nov 2023, 03:19

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Information

Published : 2020-08-12 18:15

Updated : 2024-11-21 05:07


NVD link : CVE-2020-17360

Mitre link : CVE-2020-17360

CVE.ORG link : CVE-2020-17360


JSON object : View

Products Affected

readytalk

  • avian
CWE
CWE-125

Out-of-bounds Read

CWE-190

Integer Overflow or Wraparound

CWE-787

Out-of-bounds Write