CVE-2024-32669 (GCVE-0-2024-32669)
Vulnerability from cvelistv5 – Published: 2024-05-09 06:02 – Updated: 2024-08-02 02:13
VLAI?
Summary
Improper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.
However, it occurs in the test code and does not include in the release.
This issue affects escargot: 4.0.0.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Samsung Open Source | Escargot |
Affected:
4.0.0
|
Credits
Jeongmin Choi
Sangwoo Park
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:samsung_open_source:escargot:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "escargot",
"vendor": "samsung_open_source",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32669",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-10T18:34:09.355482Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:10.821Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.338Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/Samsung/escargot/pull/1326"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"TestCode"
],
"packageName": "JavaScript engine",
"product": "Escargot",
"repo": "https://github.com/Samsung/escargot/",
"vendor": "Samsung Open Source",
"versions": [
{
"status": "affected",
"version": "4.0.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Jeongmin Choi"
},
{
"lang": "en",
"type": "reporter",
"value": "Sangwoo Park"
}
],
"datePublic": "2024-05-01T01:56:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\n\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\u003cbr\u003eHowever, it occurs in the test code and does not include in the release.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThis issue affects escargot: 4.0.0.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\nHowever, it occurs in the test code and does not include in the release.\n\nThis issue affects escargot: 4.0.0.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-09T06:02:57.653Z",
"orgId": "ca193ba2-0cff-4e34-b04e-1ea07103c6fe",
"shortName": "samsung.tv_appliance"
},
"references": [
{
"url": "https://github.com/Samsung/escargot/pull/1326"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Possible stack overflow due to a string encoding processing error",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "ca193ba2-0cff-4e34-b04e-1ea07103c6fe",
"assignerShortName": "samsung.tv_appliance",
"cveId": "CVE-2024-32669",
"datePublished": "2024-05-09T06:02:53.218Z",
"dateReserved": "2024-04-17T05:10:39.226Z",
"dateUpdated": "2024-08-02T02:13:40.338Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\\nHowever, it occurs in the test code and does not include in the release.\\n\\nThis issue affects escargot: 4.0.0.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de validaci\\u00f3n de entrada incorrecta en el motor JavaScript escargot de c\\u00f3digo abierto de Samsung permite desbordar b\\u00faferes. Sin embargo, aparece en el c\\u00f3digo de prueba y no se incluye en la versi\\u00f3n. Este problema afecta a escargot: 4.0.0.\"}]",
"id": "CVE-2024-32669",
"lastModified": "2024-11-21T09:15:26.217",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"PSIRT@samsung.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
"published": "2024-05-14T15:36:53.097",
"references": "[{\"url\": \"https://github.com/Samsung/escargot/pull/1326\", \"source\": \"PSIRT@samsung.com\"}, {\"url\": \"https://github.com/Samsung/escargot/pull/1326\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "PSIRT@samsung.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"PSIRT@samsung.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}, {\"lang\": \"en\", \"value\": \"CWE-125\"}, {\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-32669\",\"sourceIdentifier\":\"PSIRT@samsung.com\",\"published\":\"2024-05-14T15:36:53.097\",\"lastModified\":\"2024-11-21T09:15:26.217\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\\nHowever, it occurs in the test code and does not include in the release.\\n\\nThis issue affects escargot: 4.0.0.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el motor JavaScript escargot de c\u00f3digo abierto de Samsung permite desbordar b\u00faferes. Sin embargo, aparece en el c\u00f3digo de prueba y no se incluye en la versi\u00f3n. Este problema afecta a escargot: 4.0.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"PSIRT@samsung.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"PSIRT@samsung.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"references\":[{\"url\":\"https://github.com/Samsung/escargot/pull/1326\",\"source\":\"PSIRT@samsung.com\"},{\"url\":\"https://github.com/Samsung/escargot/pull/1326\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"modules\": [\"TestCode\"], \"packageName\": \"JavaScript engine\", \"product\": \"Escargot\", \"repo\": \"https://github.com/Samsung/escargot/\", \"vendor\": \"Samsung Open Source\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0.0\"}]}], \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Jeongmin Choi\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Sangwoo Park\"}], \"datePublic\": \"2024-05-01T01:56:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cp\u003e\\n\\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\u003cbr\u003eHowever, it occurs in the test code and does not include in the release.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThis issue affects escargot: 4.0.0.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\"}], \"value\": \"\\nImproper Input Validation vulnerability in Samsung Open Source escargot JavaScript engine allows Overflow Buffers.\\nHowever, it occurs in the test code and does not include in the release.\\n\\nThis issue affects escargot: 4.0.0.\\n\\n\"}], \"impacts\": [{\"capecId\": \"CAPEC-100\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-100 Overflow Buffers\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"LOW\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\", \"lang\": \"en\", \"type\": \"CWE\"}]}, {\"descriptions\": [{\"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\", \"lang\": \"en\", \"type\": \"CWE\"}]}, {\"descriptions\": [{\"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"ca193ba2-0cff-4e34-b04e-1ea07103c6fe\", \"shortName\": \"samsung.tv_appliance\", \"dateUpdated\": \"2024-05-09T06:02:57.653Z\"}, \"references\": [{\"url\": \"https://github.com/Samsung/escargot/pull/1326\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"title\": \"Possible stack overflow due to a string encoding processing error\", \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32669\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-10T18:34:09.355482Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:samsung_open_source:escargot:*:*:*:*:*:*:*:*\"], \"vendor\": \"samsung_open_source\", \"product\": \"escargot\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-10T18:35:10.640Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-32669\", \"assignerOrgId\": \"ca193ba2-0cff-4e34-b04e-1ea07103c6fe\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"samsung.tv_appliance\", \"dateReserved\": \"2024-04-17T05:10:39.226Z\", \"datePublished\": \"2024-05-09T06:02:53.218Z\", \"dateUpdated\": \"2024-06-04T17:52:10.821Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…