• 公告ID (KylinSec-SA-2022-2653)

摘要:

Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.

安全等级: Low

公告ID: KylinSec-SA-2022-2653

发布日期: 2022年11月25日

关联CVE: CVE-2022-42920  

  • 详细介绍

1. 漏洞描述

   

Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-42920 KY3.4-4A bcel Unaffected
CVE-2022-42920 KY3.4-5A bcel Unaffected
CVE-2022-42920 KY3.5.1 bcel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-2652 下一篇:KylinSec-SA-2022-2654