Hermes OOB write: potential arbitrary code via crafted JS
CVE-2022-32234 Published on October 11, 2022

An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.

NVD

Weakness Type

What is a Memory Corruption Vulnerability?

The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.

CVE-2022-32234 has been classified to as a Memory Corruption vulnerability or weakness.


Products Associated with CVE-2022-32234

Want to know whenever a new CVE is published for Facebook Hermes? stack.watch will email you.

 

Affected Versions

Facebook Hermes:

Exploit Probability

EPSS
0.79%
Percentile
73.55%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.