Impact
Samsung’s open‑source JavaScript engine Escargot is affected by a heap‑based buffer overflow that can corrupt memory when an overflow occurs. This flaw allows an attacker to overwrite adjacent memory areas, potentially leading to arbitrary code execution or denial of service. The vulnerability is identified as CWE‑122 and carries a CVSS score of 7.8, indicating a high severity level.
Affected Systems
The affected product is Samsung Open Source Escargot. The specific commit impacted is 590345cc6258317c5da850d846ce6baaf2afc2d3. No additional version ranges are listed.
Risk and Exploitability
The CVSS score of 7.8 denotes a high severity risk. EPSS information is not available, so the current exploitation probability is unknown. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed exploits are publicly documented. The attack vector is not specified in the supplied data, so it is not clear whether the flaw requires local access or can be triggered remotely. The potential impact remains that an attacker who exploits the overflow could run arbitrary code or crash the application.
OpenCVE Enrichment