A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of an attacker-controllable uninitialized stack value. This can be used to modify memory, causing a crash or potentially exploitable heap corruption.
References
Link | Resource |
---|---|
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | Patch Third Party Advisory |
https://warcollar.com/cve-2020-24753.html | Exploit Third Party Advisory |
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | Patch Third Party Advisory |
https://warcollar.com/cve-2020-24753.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 - Patch, Third Party Advisory | |
References | () https://warcollar.com/cve-2020-24753.html - Exploit, Third Party Advisory |
Information
Published : 2020-09-17 18:15
Updated : 2024-11-21 05:16
NVD link : CVE-2020-24753
Mitre link : CVE-2020-24753
CVE.ORG link : CVE-2020-24753
JSON object : View
Products Affected
objective_open_cbor_run-time_project
- objective_open_cbor_run-time