Description
An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References (5)
Core 5
Core References
Third Party Advisory x_refsource_misc
https://github.com/ReadyTalk/avian/issues
Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2020/Aug/8
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/11
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/14
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Sep/13
Scores
CVSS v3
7.8
EPSS
0.0034
EPSS Percentile
56.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-190
CWE-125
CWE-787
Status
published
Products (1)
readytalk/avian
1.2.0
Published
Aug 12, 2020
Tracked Since
Feb 18, 2026