CVE-2026-47311
Heap-based Buffer Overflow in Samsung Open Source Escargot
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Samsung TV & Appliance
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | escargot | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-based buffer overflow in Samsung Open Source Escargot. It occurs when the software improperly handles memory buffers, allowing data to overflow beyond the allocated space on the heap.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the heap-based buffer overflow vulnerability in Samsung Open Source Escargot, you should update to the latest fixed version of Escargot where the issue has been addressed.
Refer to the official Samsung Escargot GitHub repository for the patch and update instructions, specifically the pull request #1565 which fixes crash issues related to this vulnerability.
How can this vulnerability impact me? :
The vulnerability can lead to serious impacts including unauthorized code execution, data corruption, or system crashes. Because it affects confidentiality, integrity, and availability, an attacker could exploit this to gain control or disrupt the affected system.