Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-311: Apple macOS CoreSymbolication Out-Of-Bounds Read Information Disclosure Vulnerability

    May 13, 2026

    New critical Exim mailer flaw allows remote code execution

    May 13, 2026

    cPanel security advisory (AV26-464) – Canadian Centre for Cyber Security

    May 13, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»CVE-2026-32686 | THREATINT
    Alerts

    CVE-2026-32686 | THREATINT

    adminBy adminMay 7, 2026No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Home

    Description

    Uncontrolled Resource Consumption vulnerability in ericmj decimal allows unauthenticated remote Denial of Service. The decimal library does not bound the exponent on parsed input. Storing a decimal with a very large exponent (e.g. Decimal.new(“1e1000000000”)) is accepted without error. Subsequent calls to arithmetic functions (Decimal.add/2, Decimal.sub/2, Decimal.div/2), Decimal.to_string/2 with :normal or :xsd format, Decimal.to_integer/1, Decimal.round/3, or Decimal.compare/3 with a threshold allocate memory proportional to the exponent value, which can exhaust available memory and crash the BEAM VM. Any application that accepts user-supplied decimal input and subsequently performs arithmetic, rounding, conversion to integer, or string formatting on it is exposed. A single malicious request is sufficient to cause an out-of-memory crash. This issue affects decimal: from 0.1.0 before 3.0.0.

    PUBLISHED Reserved 2026-03-13 | Published 2026-05-07 | Updated 2026-05-07 | Assigner EEF

    MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

    Problem types

    CWE-400 Uncontrolled Resource Consumption

    Product status

    Default status
    affected

    0.1.0 (semver) before 3.0.0
    affected

    Default status
    affected

    bc11f4a2b6fb61fc1360a0ab4e79141bba918841 (git) before 6a523f3a73b8c9974540e21c7aa88f1258bb35ae
    affected

    Credits

    Peter Ullrich finder

    Eric Meadows-Jönsson remediation developer

    José Valim remediation reviewer

    Wojtek Mach remediation reviewer

    Jonatan Männchen analyst

    ruslandoga remediation reviewer

    Matthew Johnston remediation reviewer

    References

    github.com/…ecimal/security/advisories/GHSA-rhv4-8758-jx7v vendor-advisory related

    cna.erlef.org/cves/CVE-2026-32686.html related

    osv.dev/vulnerability/EEF-CVE-2026-32686 related

    github.com/…ommit/6a523f3a73b8c9974540e21c7aa88f1258bb35ae patch

    cve.org (CVE-2026-32686)

    nvd.nist.gov (CVE-2026-32686)

    Download JSON



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe OSINT Newsletter – Issue #105
    Next Article Ivanti warns of new EPMM flaw exploited in zero-day attacks
    admin
    • Website

    Related Posts

    Alerts

    ZDI-26-311: Apple macOS CoreSymbolication Out-Of-Bounds Read Information Disclosure Vulnerability

    May 13, 2026
    Alerts

    cPanel security advisory (AV26-464) – Canadian Centre for Cyber Security

    May 13, 2026
    Alerts

    SSA-973901 V1.0: Arbitrary File Disclosure Vulnerability in Ruggedcom Rox Before V2.17.1

    May 13, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Our Picks

    ZDI-26-311: Apple macOS CoreSymbolication Out-Of-Bounds Read Information Disclosure Vulnerability

    May 13, 2026

    New critical Exim mailer flaw allows remote code execution

    May 13, 2026

    cPanel security advisory (AV26-464) – Canadian Centre for Cyber Security

    May 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.