5
CVSSv2

CVE-2017-14227

Published: 09/09/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote malicious users to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mongodb mongodb 1.7.0

Vendor Advisories

Debian Bug report logs - #874754 libbson: CVE-2017-14227 Package: src:libbson; Maintainer for src:libbson is A Jesse Jiryu Davis <jesse@mongodbcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 9 Sep 2017 13:33:01 UTC Severity: important Tags: security, upstream Found in version libbson/170- ...
In MongoDB libbson 170, the bson_iter_codewscope function in bson-iterc miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8c), as demonstrated by bson-to-jsonc ...