Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-8252 |
CWE-ID | CWE-120 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Adobe Reader Client/Desktop applications / Office applications libuv (Alpine package) Operating systems & Components / Operating system package or component |
Vendor |
Adobe Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU47248
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-8252
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to incorrect validation of realpath in libuv. The library incorrectly determines the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes. A remote attacker can pass an overly long path to the application that is using the library, trigger memory corruption and execute arbitrary code on the system.
Install update from vendor's website.
Vulnerable software versionsAdobe Reader: 15.006.30097
libuv (Alpine package): 2.19-1
libuv (Alpine package): 0.108
libuv (Alpine package): 0.16.0-2
libuv (Alpine package): 0.7.2-1
libuv (Alpine package): 1.0.3-3 - 1.0.4-1
libuv (Alpine package): 1.3.8-1
libuv (Alpine package): 1.2.5-3ubuntu3
libuv (Alpine package): 3.6.3-0ubuntu1 - 3.6.4-0ubuntu8
libuv (Alpine package): 2.2.8-4 - 2.2.8-5
libuv (Alpine package): 0.1.1b-8
libuv (Alpine package): 5.4.0-4ubuntu1
libuv (Alpine package): 3.0.3-0.1 - 3.0.3-0.2
libuv (Alpine package): 1.6.3-1
libuv (Alpine package): 1.7-27 - 1.8-1
libuv (Alpine package): 2.10.2-2
libuv (Alpine package): 3.2.5-1 - 3.2.6-1
libuv (Alpine package): 2.18.50.20080806-0ubuntu1
libuv (Alpine package): 2.85.12
libuv (Alpine package): 6u131
libuv (Alpine package): 6.0.1.0
libuv (Alpine package): 0.2.80
libuv (Alpine package): 6.7.5-4
libuv (Alpine package): 2.2.2
libuv (Alpine package): 4.0d
libuv (Alpine package): 7
libuv (Alpine package): 8.1.6
libuv (Alpine package):
libuv (Alpine package): before 1.38.1-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=7685b3c199f15e168ce4fd00eb5d5ec7c9bd458b
https://git.alpinelinux.org/aports/commit/?id=a482a6a5615894d7ac53517c87e5d5c6352eb68b
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.