An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::exactly() which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2018-19839
### Vulnerable Library - CSS::Sassv3.4.11
In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
WS-2019-0605
### Vulnerable Library - CSS::Sassv3.4.11
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Vulnerable Library - CSS::Sassv3.4.11
Library home page: https://metacpan.org/pod/CSS::Sass
Vulnerable Source Files (1)
/node_modules/node-sass/src/libsass/src/utf8/checked.h
Vulnerabilities
Details
CVE-2018-11697
### Vulnerable Library - CSS::Sassv3.4.11Library home page: https://metacpan.org/pod/CSS::Sass
Found in base branch: master
### Vulnerable Source Files (0)An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::exactly() which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
Publish Date: 2018-06-04
URL: CVE-2018-11697
### CVSS 3 Score Details (8.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/sass/libsass/releases/tag/3.6.0
Release Date: 2018-06-04
Fix Resolution: libsass - 3.6.0
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)CVE-2018-19839
### Vulnerable Library - CSS::Sassv3.4.11Library home page: https://metacpan.org/pod/CSS::Sass
Found in base branch: master
### Vulnerable Source Files (1)/node_modules/node-sass/src/libsass/src/utf8/checked.h
### Vulnerability DetailsIn LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file.
Publish Date: 2018-12-04
URL: CVE-2018-19839
### CVSS 3 Score Details (6.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/sass/libsass/releases/tag/3.6.0
Release Date: 2018-12-04
Fix Resolution: libsass - 3.6.0
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)WS-2019-0605
### Vulnerable Library - CSS::Sassv3.4.11Library home page: https://metacpan.org/pod/CSS::Sass
Found in base branch: master
### Vulnerable Source Files (1)/node_modules/node-sass/src/libsass/src/lexer.cpp
### Vulnerability DetailsIn sass versions between 3.2.0 to 3.6.3 may read 1 byte outside an allocated buffer while parsing a specially crafted css rule.
Publish Date: 2019-07-16
URL: WS-2019-0605
### CVSS 3 Score Details (6.2)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://osv.dev/vulnerability/OSV-2020-734
Release Date: 2019-07-16
Fix Resolution: 3.6.4
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)