Description
The lexer_process_char_literal function in jerry-core/parser/js/js-lexer.c in JerryScript 1.0 does not skip memory allocation for empty strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed JavaScript source code, related to the jmem_heap_free_block function.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_confirm
https://github.com/zherczeg/jerryscript/commit/03a8c630f015f63268639d3ed3bf82cff6fa77d8
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/jerryscript-project/jerryscript/issues/1821
Patch, Third Party Advisory x_refsource_confirm
https://github.com/jerryscript-project/jerryscript/commit/e58f2880df608652aff7fd35c45b242467ec0e79
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1038413
Scores
CVSS v3
7.5
EPSS
0.0238
EPSS Percentile
85.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (1)
jerryscript/jerryscript
1.0
Published
May 28, 2017
Tracked Since
Feb 18, 2026