quickjs-ng QuickJS up to 0.8.0 qjs quickjs.c JS_GetRuntime stack-based overflow
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.2 | $0-$5k | 0.38 |
Summary
A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been classified as problematic. The impacted element is the function JS_GetRuntime of the file quickjs.c of the component qjs. This manipulation causes stack-based overflow.
This vulnerability is handled as CVE-2024-13903. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
Details
A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been declared as problematic. Affected by this vulnerability is the function JS_GetRuntime of the file quickjs.c of the component qjs. The manipulation with an unknown input leads to a stack-based overflow vulnerability. The CWE definition for the vulnerability is CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). As an impact it is known to affect availability.
It is possible to read the advisory at github.com. This vulnerability is known as CVE-2024-13903. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. It demands that the victim is doing some kind of user interaction. Technical details of the vulnerability are known, but there is no available exploit.
Upgrading to version 0.9.0 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 99c02eb45170775a9a679c32b45dd4000ea67aff is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Vector: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.2
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 4.3
CNA Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Stack-based overflowCWE: CWE-121 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: QuickJS 0.9.0
Patch: 99c02eb45170775a9a679c32b45dd4000ea67aff
Timeline
03/21/2025 🔍03/21/2025 🔍
03/21/2025 🔍
Sources
Product: github.comAdvisory: 74fd4d7dc90f7ebf07e0bb4c7223d1cb98f8ad78
Status: Confirmed
CVE: CVE-2024-13903 (🔍)
GCVE (CVE): GCVE-0-2024-13903
GCVE (VulDB): GCVE-100-300571
Entry
Created: 03/21/2025 07:49Updated: 03/21/2025 09:08
Changes: 03/21/2025 07:49 (59), 03/21/2025 09:08 (30)
Complete: 🔍
Submitter: Haoxin Tu
Cache ID: 216:ACD:103
Submit
Accepted
- Submit #517394: QuickJS Project QuickJS master version https://github.com/quickjs-ng/quickjs/commit/74fd4d7dc90f7ebf07e0bb4c7223d1cb98f8ad78 Stack-based Buffer Overflow (by Haoxin Tu)
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.