-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The key vulnerability stemmed from improper length validation in DataItemFormatExplicit::getText. The commit diff shows a critical addition of 'return false' when invalid lengths are detected, which would prevent further unsafe processing. This matches the CWE-125 (Out-of-bounds Read) description and the PoC showing buffer overflow in DataItemBits::getBits when processing malformed data. The function directly controlling the validation flow (DataItemFormatExplicit::getText) is the root cause, while DataItemBits::getBits is the exploitation point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| asterix_decoder | pip | < 0.7.2 | 0.7.2 |