Описание
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
Ссылки
- ExploitThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:virustotal:yara:3.8.1:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.00255
Низкий
5.5 Medium
CVSS3
7.1 High
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 5.5
ubuntu
около 7 лет назад
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
CVSS3: 5.5
debian
около 7 лет назад
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read ...
CVSS3: 5.5
github
больше 3 лет назад
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
EPSS
Процентиль: 49%
0.00255
Низкий
5.5 Medium
CVSS3
7.1 High
CVSS2
Дефекты
CWE-125