Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15368

Опубликовано: 16 окт. 2017
Источник: debian

Описание

The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
radare2fixed2.1.0+dfsg-1package
radare2not-affectedjessiepackage
radare2not-affectedwheezypackage

Примечания

  • https://github.com/radare/radare2/issues/8673

  • https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.

CVSS3: 7.8
nvd
больше 8 лет назад

The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.

CVSS3: 7.8
github
больше 3 лет назад

The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.