Description
All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2443 | All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability. |
Github GHSA |
GHSA-wxr3-2hgv-qm8f | node-twain vulnerable to Improper Check or Handling of Exceptional Conditions |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-01T22:27:34.814Z
Reserved: 2023-12-22T12:33:20.122Z
Link: CVE-2024-21525
Updated: 2024-08-01T22:27:34.814Z
Status : Deferred
Published: 2024-07-10T05:15:11.530
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21525
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA