To remediate this issue, users should upgrade to version 0.6.0 or later.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws aws-c-event-stream |
|
| Vendors & Products |
Aws
Aws aws-c-event-stream |
Tue, 31 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Out-of-bounds write in the streaming decoder component in aws-c-event-stream before 0.6.0 might allow a third party operating a server to cause memory corruption leading to arbitrary code execution on a client application that processes crafted event-stream messages. To remediate this issue, users should upgrade to version 0.6.0 or later. | |
| Title | AWS C Event Stream Streaming Decoder Stack Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-01T03:55:47.631Z
Reserved: 2026-03-30T20:05:41.435Z
Link: CVE-2026-5190
Updated: 2026-03-31T17:48:08.997Z
Status : Awaiting Analysis
Published: 2026-03-31T18:16:59.080
Modified: 2026-04-01T14:23:37.727
Link: CVE-2026-5190
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:37:46Z