CVE-2026-3390
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to read sensitive data from memory by exploiting a flaw in the error reporting function of the lily software. However, the attack can only be carried out on a local machine, meaning the attacker must have access to the system where lily is running.
Technical Description
A vulnerability was identified in FascinatedBox lily up to 2.3. This issue affects the function patch_line_end of the file src/lily_build_error.c of the component Error Reporting. The manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 1, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
lily-lang
Product
lily
Related Vulnerabilities
This vulnerability allows an attacker to crash the application by causing it to try to access a part of memory that doesn't exist, leading to a program failure. However, the attacker must have local access to the system to exploit this weakness.
An attacker with local access to the system can exploit a flaw in the lily software to read data outside the intended memory boundaries, potentially exposing sensitive information. This vulnerability requires the attacker to have physical or remote access to the machine where the software is running.