CVE-2020-1921
10.03.2021, 16:15
In the crypt function, we attempt to null terminate a buffer using the size of the input salt without validating that the offset is within the buffer. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.Enginsight
Vendor | Product | Version |
---|---|---|
hhvm | 𝑥 < 4.56.3 | |
hhvm | 4.57.0 ≤ 𝑥 < 4.80.2 | |
hhvm | 4.81.0 ≤ 𝑥 < 4.93.2 | |
hhvm | 4.94.0 | |
hhvm | 4.95.0 | |
hhvm | 4.96.0 | |
hhvm | 4.97.0 | |
hhvm | 4.98.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.