CVE-2023-33546

Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:janino_project:janino:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:14

Type Values Removed Values Added
Summary janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
References
  • (MISC) https://janino-compiler.github.io/janino/#security -

08 Jun 2023, 18:49

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:janino_project:janino:*:*:*:*:*:*:*:*
First Time Janino Project janino
Janino Project
References (MISC) https://github.com/janino-compiler/janino/issues/201 - (MISC) https://github.com/janino-compiler/janino/issues/201 - Exploit, Issue Tracking, Third Party Advisory

01 Jun 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 13:15

Updated : 2024-08-02 16:15


NVD link : CVE-2023-33546

Mitre link : CVE-2023-33546


JSON object : View

Products Affected

janino_project

  • janino
CWE
CWE-787

Out-of-bounds Write