An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.
References
Link Resource
https://github.com/jerryscript-project/jerryscript/issues/2237 Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:21:52

Updated: 2022-10-03T16:21:52

Reserved: 2022-10-03T00:00:00


Link: CVE-2018-11418

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-05-24T20:29:00.353

Modified: 2019-10-03T00:03:26.223


Link: CVE-2018-11418

JSON object: View

cve-icon Redhat Information

No data.

CWE