Vulnerability Name: | CVE-2017-15368 (CCN-133453) | ||||||||||||||||
Assigned: | 2017-10-11 | ||||||||||||||||
Published: | 2017-10-11 | ||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||
Summary: | The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. | ||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-15368 Source: XF Type: UNKNOWN radare2-cve201715368-dos(133453) Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515 Source: CCN Type: radare2 GIT Repository Stack buffer overflow in r_hex_bin2str() #8673 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/radare/radare2/issues/8673 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |