Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-368j-92cq-wrg5

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js.

The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js.

EPSS

Процентиль: 62%
0.00427
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 7 лет назад

The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js.

CVSS3: 6.5
nvd
около 7 лет назад

The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap-based buffer overflow because Emscripten is misused, triggering an error in cashew::JSPrinter::printAst() in emscripten-optimizer/simple_ast.h. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by wasm2js.

CVSS3: 6.5
debian
около 7 лет назад

The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a heap- ...

EPSS

Процентиль: 62%
0.00427
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-787