icon

We found results for “

CVE-2024-27934

Date: March 6, 2024

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to version 1.40.3, use of inherently unsafe "*const c_void" and "ExternalPointer" leads to use-after-free access of the underlying structure, resulting in arbitrary code execution. Use of inherently unsafe "*const c_void" and "ExternalPointer" leads to use-after-free access of the underlying structure, which is exploitable by an attacker controlling the code executed inside a Deno runtime to obtain arbitrary code execution on the host machine regardless of permissions. This bug is known to be exploitable for both "*const c_void" and "ExternalPointer" implementations. Version 1.40.3 fixes this issue.

Severity Score

Severity Score

Weakness Type (CWE)

Use After Free

CWE-416

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us