Description
A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption. The attack requires a local approach. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
Oneafter (VulDB User)
References
vuldb.com/?id.350533 (VDB-350533 | ThakeeNathees pocketlang pkByteBufferAddString memory corruption)
vuldb.com/?ctiid.350533 (VDB-350533 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769773 (Submit #769773 | ThakeeNathees pocketlang master-branch Integer Overflow)
github.com/ThakeeNathees/pocketlang/issues/302
github.com/oneafter/0211/blob/main/po/repro
github.com/ThakeeNathees/pocketlang/