Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gmq8-994r-jv83 | yauzl contains an off-by-one error |
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thejoshwolfe
Thejoshwolfe yauzl |
|
| Vendors & Products |
Thejoshwolfe
Thejoshwolfe yauzl |
Wed, 11 Mar 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | yauzl (aka Yet Another Unzip Library) version 3.2.0 for Node.js contains an off-by-one error in the NTFS extended timestamp extra field parser within the getLastModDate() function. The while loop condition checks cursor < data.length + 4 instead of cursor + 4 <= data.length, allowing readUInt16LE() to read past the buffer boundary. A remote attacker can cause a denial of service (process crash via ERR_OUT_OF_RANGE exception) by sending a crafted zip file with a malformed NTFS extra field. This affects any Node.js application that processes zip file uploads and calls entry.getLastModDate() on parsed entries. Fixed in version 3.2.1. | |
| Title | yauzl 3.2.0 - Denial of Service via Off-by-One Error in NTFS Timestamp Parser | |
| Weaknesses | CWE-193 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-12T13:40:55.420Z
Reserved: 2026-03-10T19:48:11.109Z
Link: CVE-2026-31988
Updated: 2026-03-12T13:40:42.721Z
Status : Deferred
Published: 2026-03-11T23:16:00.530
Modified: 2026-04-15T14:56:45.970
Link: CVE-2026-31988
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:36:41Z
Github GHSA