Impact
The flaw arises when Escargot releases an invalid pointer or reference, which enables an attacker to manipulate a buffer. This action corrupts memory and may result in denial of service or provide a foothold for exploiting other vulnerabilities. The weakness is a memory management flaw classified as CWE-763.
Affected Systems
The issue is present in Samsung Escargot at commit 590345cc6258317c5da850d846ce6baaf2afc2d3. No specific version range is listed; only this commit is affected.
Risk and Exploitability
The CVSS score of 5.5 classifies the vulnerability as moderate. EPSS is not available and the vulnerability is not listed in CISA's KEV catalog, indicating no known public exploitation. The likely attack vector is local execution; an attacker with access to Escargot can corrupt memory, leading to denial of service or providing a potential launch point for other attacks. The risk remains moderate but warrants timely remediation.
OpenCVE Enrichment