Multiple vulnerabilities in Espruino



Published: 2018-05-31
Risk Low
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2018-11598
CVE-2018-11597
CVE-2018-11596
CVE-2018-11595
CVE-2018-11594
CVE-2018-11593
CVE-2018-11590
CWE-ID CWE-125
CWE-119
CWE-190
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Espruino
Universal components / Libraries / Scripting languages

Vendor Pur3 Ltd.

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Buffer over-read

EUVDB-ID: #VU14724

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11598

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information and perform a denial of service attack.

The vulnerability exists due to boundary error when parsing files in jsparse.c. A remote attacker can create a specially crafted file and gain access to sensitive information or trigger denial of service conditions.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b
http://github.com/espruino/Espruino/files/2025956/test_0.txt
http://github.com/espruino/Espruino/files/2025963/test_1.txt
http://github.com/espruino/Espruino/files/2025968/test_2.txt
http://github.com/espruino/Espruino/issues/1437


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU14725

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11597

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error during syntax parsing because of a missing check for stack exhaustion with many '{' characters in jsparse.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/51380baf17241728b6d48cdb84140b931e3e3cc5
http://github.com/espruino/Espruino/issues/1448


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU14726

Risk: Low

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11596

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89
http://github.com/espruino/Espruino/issues/1435


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU14727

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11595

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error during syntax parsing, because strncat is misused. A remote attacker can cause a denial of service (application crash) and a potential Escalation of Privileges with a user specially crafted input file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/0a7619875bf79877907205f6bee08465b89ff10b
http://github.com/espruino/Espruino/files/2019210/test_0.txt
http://github.com/espruino/Espruino/files/2019216/test_2.txt
http://github.com/espruino/Espruino/files/2019220/test_4.txt
http://github.com/espruino/Espruino/issues/1425 


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU14728

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11594

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error during syntax parsing of "VOID" tokens in jsparse.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29
http://github.com/espruino/Espruino/files/2022588/input.txt
http://github.com/espruino/Espruino/issues/1434 


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU14729

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11593

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to boundary error during syntax parsing because strncpy is misused in jslex.c. A remote attacker can cause a denial of service (application crash) and potential Information Disclosure with a user specially crafted input file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018
http://github.com/espruino/Espruino/files/2019228/eh_0.txt
http://github.com/espruino/Espruino/issues/1426 


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

EUVDB-ID: #VU14730

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-11590

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to integer overflow when parsing files in jsutils.c. A remote attacker can supply a specially crafted file to the interpreter, trigger integer overflow and crash the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Espruino: 1.44 - 1.98

External links

http://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780
http://github.com/espruino/Espruino/files/2019243/so_0.txt
http://github.com/espruino/Espruino/issues/1427


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###