Impact
An integer overflow has been identified in the Samsung Open Source Escargot project. The flaw allows an attacker to supply input that causes a size calculation to wrap around, leading to a buffer overflow. The resulting memory corruption could compromise the stability and confidentiality of the affected system.
Affected Systems
The vulnerability affects the Escargot JavaScript engine from Samsung Open Source. The affected code is identified by commit 97e8115ab1110bc502b4b5e4a0c689a71520d335. No specific release version numbers are listed in the advisory.
Risk and Exploitability
The CVSS base score of 8.1 indicates a high severity vulnerability. Exploit probability (EPSS) data is not provided. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. While the description does not specify how the overflow could be triggered, it is reasonable to assume that any malicious input processed by the vulnerable function could trigger the overflow, making both local and remote exploitation theoretically possible depending on the context in which Escargot runs.
OpenCVE Enrichment