mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
3.0 KiB
JSON
82 lines
3.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2020-17361",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h returns silently when a negative length is provided (instead of throwing an exception). This could result in data being lost during the copy, with varying consequences depending on the subsequent use of the destination buffer. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/ReadyTalk/avian/issues",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/ReadyTalk/avian/issues"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2020/Aug/10",
|
|
"url": "http://seclists.org/fulldisclosure/2020/Aug/10"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20200904 Noise-Java AESGCMFallbackCipherState.encryptWithAd() insufficient boundary checks",
|
|
"url": "http://seclists.org/fulldisclosure/2020/Sep/11"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20200904 Noise-Java ChaChaPolyCipherState.encryptWithAd() insufficient boundary checks",
|
|
"url": "http://seclists.org/fulldisclosure/2020/Sep/14"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20200904 Noise-Java AESGCMOnCtrCipherState.encryptWithAd() insufficient boundary checks",
|
|
"url": "http://seclists.org/fulldisclosure/2020/Sep/13"
|
|
}
|
|
]
|
|
}
|
|
} |