Skip to content

Remote Memory Exposure in bl

Moderate severity GitHub Reviewed Published Sep 2, 2020 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

npm bl (npm)

Affected versions

= 3.0.0
>= 4.0.0, < 4.0.3
< 1.2.3
>= 2.0.0, < 2.2.1

Patched versions

3.0.1
4.0.3
1.2.3
2.2.1

Description

A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.

References

Published by the National Vulnerability Database Aug 30, 2020
Reviewed Sep 2, 2020
Published to the GitHub Advisory Database Sep 2, 2020
Last updated Feb 1, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

CVE ID

CVE-2020-8244

GHSA ID

GHSA-pp7h-53gx-mx7r

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.