An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_hex function via a RegExp("[\\u0") payload, related to re_parse_char_class in parser/regexp/re-parser.c.
References
Link Resource
https://github.com/jerryscript-project/jerryscript/issues/2230 Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:21:50

Updated: 2022-10-03T16:21:50

Reserved: 2022-10-03T00:00:00


Link: CVE-2018-11419

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-05-24T20:29:00.400

Modified: 2019-10-03T00:03:26.223


Link: CVE-2018-11419

JSON object: View

cve-icon Redhat Information

No data.

CWE