Risk | Low |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2018-11598 CVE-2018-11597 CVE-2018-11596 CVE-2018-11595 CVE-2018-11594 CVE-2018-11593 CVE-2018-11590 |
CWE-ID | CWE-125 CWE-119 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Espruino Universal components / Libraries / Scripting languages |
Vendor | Pur3 Ltd. |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU14724
Risk: Low
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11598
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information and perform a denial of service attack.
The vulnerability exists due to boundary error when parsing files in jsparse.c. A remote attacker can create a specially crafted file and gain access to sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b
http://github.com/espruino/Espruino/files/2025956/test_0.txt
http://github.com/espruino/Espruino/files/2025963/test_1.txt
http://github.com/espruino/Espruino/files/2025968/test_2.txt
http://github.com/espruino/Espruino/issues/1437
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14725
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11597
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error during syntax parsing because of a missing check for stack exhaustion with many '{' characters in jsparse.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/51380baf17241728b6d48cdb84140b931e3e3cc5
http://github.com/espruino/Espruino/issues/1448
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14726
Risk: Low
CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11596
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89
http://github.com/espruino/Espruino/issues/1435
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14727
Risk: Low
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11595
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error during syntax parsing, because strncat is misused. A remote attacker can cause a denial of service (application crash) and a potential Escalation of Privileges with a user specially crafted input file.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/0a7619875bf79877907205f6bee08465b89ff10b
http://github.com/espruino/Espruino/files/2019210/test_0.txt
http://github.com/espruino/Espruino/files/2019216/test_2.txt
http://github.com/espruino/Espruino/files/2019220/test_4.txt
http://github.com/espruino/Espruino/issues/1425
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14728
Risk: Low
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11594
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error during syntax parsing of "VOID" tokens in jsparse.c. A remote attacker can cause a denial of service (application crash) with a user specially crafted input file.
Install update from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29
http://github.com/espruino/Espruino/files/2022588/input.txt
http://github.com/espruino/Espruino/issues/1434
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14729
Risk: Low
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11593
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error during syntax parsing because strncpy is misused in jslex.c. A remote attacker can cause a denial of service (application crash) and potential Information Disclosure with a user specially crafted input file.
MitigationInstall update from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018
http://github.com/espruino/Espruino/files/2019228/eh_0.txt
http://github.com/espruino/Espruino/issues/1426
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU14730
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-11590
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to integer overflow when parsing files in jsutils.c. A remote attacker can supply a specially crafted file to the interpreter, trigger integer overflow and crash the application.
Install updates from vendor's website.
Vulnerable software versionsEspruino: 1.44 - 1.98
External linkshttp://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780
http://github.com/espruino/Espruino/files/2019243/so_0.txt
http://github.com/espruino/Espruino/issues/1427
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.