Vulnerability Details : CVE-2020-1917
xbuf_format_converter, used as part of exif_read_data, was appending a terminating null character to the generated string, but was not using its standard append char function. As a result, if the buffer was full, it would result in an out-of-bounds write. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2020-1917
- cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*
- cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1917
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1917
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-1917
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: cve-assign@fb.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-1917
-
https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca
security fixes · facebook/hhvm@08193b7 · GitHubPatch;Third Party Advisory
-
https://hhvm.com/blog/2021/02/25/security-update.html
Security Update | HHVMRelease Notes;Vendor Advisory
Jump to