CVE-2020-17360

HIGH

ReadyTalk Avian 1.2.0 - Memory Corruption

Title source: llm
STIX 2.1

Description

An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

References (5)

Core 5
Core References
Third Party Advisory x_refsource_misc
https://github.com/ReadyTalk/avian/issues
Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2020/Aug/8
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/11
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/14
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/13

Scores

CVSS v3 7.8
EPSS 0.0034
EPSS Percentile 56.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-190 CWE-125 CWE-787
Status published
Products (1)
readytalk/avian 1.2.0
Published Aug 12, 2020
Tracked Since Feb 18, 2026