Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19974

Опубликовано: 17 дек. 2018
Источник: debian
EPSS Низкий

Описание

In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
yarafixed3.8.1-2package
yarano-dsastretchpackage
yarano-dsajessiepackage

Примечания

  • https://github.com/VirusTotal/yara/issues/999

  • https://bnbdr.github.io/posts/extracheese/

  • https://github.com/bnbdr/swisscheese/

  • https://github.com/VirusTotal/yara/commit/6acc08d7329413f60e0976be017e18a581450d7a

  • https://github.com/VirusTotal/yara/commit/d8f714891ed92da15d50b397b74d1d9431e9c54c

EPSS

Процентиль: 48%
0.00253
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 7 лет назад

In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).

CVSS3: 5.5
nvd
около 7 лет назад

In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).

CVSS3: 5.5
github
больше 3 лет назад

In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).

EPSS

Процентиль: 48%
0.00253
Низкий