Access of Memory Location After End of Buffer Affecting undici package, versions >=6.14.0 <6.19.2
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-UNDICI-7361667
- published 25 Jun 2024
- disclosed 21 Jun 2024
- credit wille
Introduced: 21 Jun 2024
CVE-2024-38372 Open this link in a new tabHow to fix?
Upgrade undici
to version 6.19.2 or higher.
Overview
undici is an An HTTP/1.1 client, written from scratch for Node.js
Affected versions of this package are vulnerable to Access of Memory Location After End of Buffer when cloning an arrayBuffer
in body.js
and util.js
. This exposes some process memory when returning a buffer not exactly 8192 bytes in length. The attacker cannot fully control the contents of the returned buffer.