Buffer Overflow in MuJS Affects Artifex Software
CVE-2021-33797
9.8CRITICAL
Summary
A buffer overflow vulnerability exists in the Artifex MuJS JavaScript interpreter, specifically in the jsdtoa.c file. This issue arises due to an integer overflow during the processing of floating point exponents by the js_strtod() function. When values exceed expected limits, it can lead to a buffer overflow, posing potential risks to the stability and security of applications utilizing affected versions. Users are urged to upgrade to patched versions to mitigate these risks.
Affected Version(s)
mujs mujs in versions 1.0.1 to 1.1.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved