-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
buffer overflow #7
Comments
This issue was resolved by the fix to issue #5. |
This was referenced May 11, 2020
This was referenced Oct 20, 2020
This was referenced Oct 31, 2020
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Enviroment
poc:
vulnerability description:
The code that caused the vulnerability is on line src / jsiArray.c: 464, the function
jsi_ArrayFilterCmd
, the code is as follows:curlen
is obtained by reading the length of the object obj, as shown in the figure:Modify the length of obj in PoC to a larger value, ie:
Then call the
o.filter
function to trigger jsish'sjsi_ArrayFilterCmd
function, and then make thecurlen
value larger, and access the heap space after theobj-> arr
array is crossed.The text was updated successfully, but these errors were encountered: