Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-75jp-vq8x-h4cq

Опубликовано: 07 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.3

Описание

Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters

Summary

In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm.

Impact

After conducting an analysis of the dependent Polkadot systems of wasmi: Pallet Contracts, Parity Signer, and Smoldot, we have found that none on those systems have been affected by the issue as they are calling host to Wasm function with a small limited amount of parameters always.

Mitigations

If you are using wasmi betwen version 0.15.0 and 0.31.0, please update it to the 0.31.1 patch release that we just published.

Workarounds

Ensure no more than 128 parameters can be pass in a call from the host to a Wasm function.

References

Patch PR:

Special thanks

Special thanks to Stellar Development Foundation for reporting this security vulnerability.

Пакеты

Наименование

wasmi

rust
Затронутые версииВерсия исправления

>= 0.15.0, <= 0.31.0

0.31.1

EPSS

Процентиль: 54%
0.00312
Низкий

7.3 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.3
nvd
почти 2 года назад

Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.

EPSS

Процентиль: 54%
0.00312
Низкий

7.3 High

CVSS3

Дефекты

CWE-787