← Back to CVEs
CVE-2021-33797
CRITICAL9.8
Description
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/17/2023
Last Modified2/6/2025
Sourcenvd
Honeypot Sightings0
Affected Products
artifex:mujs
Weaknesses (CWE)
CWE-119CWE-190
References
https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550(patrick@puiterwijk.org)
https://github.com/ccxvii/mujs/issues/148(patrick@puiterwijk.org)
https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ccxvii/mujs/issues/148(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ccxvii/mujs/issues/148(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.