All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2443 All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability.
Github GHSA Github GHSA GHSA-wxr3-2hgv-qm8f node-twain vulnerable to Improper Check or Handling of Exceptional Conditions
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-01T22:27:34.814Z

Reserved: 2023-12-22T12:33:20.122Z

Link: CVE-2024-21525

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:34.814Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-10T05:15:11.530

Modified: 2024-11-21T08:54:37.153

Link: CVE-2024-21525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses