Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-7700

Опубликовано: 10 фев. 2019
Источник: debian
EPSS Низкий

Описание

A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::visitCall in wasm-binary.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-merge.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
binaryenfixed64-1package

Примечания

  • https://github.com/WebAssembly/binaryen/issues/1864

EPSS

Процентиль: 54%
0.00308
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 7 лет назад

A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::visitCall in wasm-binary.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-merge.

CVSS3: 6.5
nvd
почти 7 лет назад

A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::visitCall in wasm-binary.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-merge.

CVSS3: 6.5
github
больше 3 лет назад

A heap-based buffer over-read was discovered in wasm::WasmBinaryBuilder::visitCall in wasm-binary.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-merge.

EPSS

Процентиль: 54%
0.00308
Низкий