5.5
CVSSv3

CVE-2020-12135

Published: 24/04/2020 Updated: 12/08/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

bson prior to 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

whoopsie project whoopsie

mongodb c driver

Vendor Advisories

Debian Bug report logs - #958998 CVE-2020-12135 in embedded bson Package: src:duo-unix; Maintainer for src:duo-unix is Kees Cook <kees@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 27 Apr 2020 21:12:01 UTC Severity: normal Tags: security, upstream Reply or subscribe to this bug Toggl ...

Github Repositories

Vulnerability in apport daemon (aka whoopsie) An integer overflow in whoopsie 0269, results in an out-of-bounds write to a heap allocated buffer when 'bytesNeeded' exceeds max of uint32 An exploit could allow the attacker to cause a denial of service (segmentation fault and crash) Basic When a program has been crashed, Linux system tries to create a ‘c