
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in libslax through v0.22.1 where slaxLexer() in slaxlexer.c contains a heap-based buffer overflow vulnerability (NVD, CVE).
The vulnerability exists in the slaxLexer() function within slaxlexer.c at line 986, where a heap-buffer-overflow occurs during input processing. The issue was identified using AddressSanitizer, which detected a READ operation of size 1 at an invalid memory address located 0 bytes to the right of an 8192-byte allocated region (GitHub Issue). The vulnerability has been assigned a CVSS v3.1 base score of 8.8 HIGH with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
The heap-based buffer overflow vulnerability could potentially lead to arbitrary code execution, system crashes, or information disclosure. The high CVSS score indicates severe potential impacts on the confidentiality, integrity, and availability of affected systems (NVD).
Users should upgrade to a version newer than v0.22.1 of libslax once available. The vulnerability was reported and documented in the official issue tracker, indicating awareness by the maintainers (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."