Описание
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:virustotal:yara:3.11.0:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
EPSS
Процентиль: 68%
0.0056
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 7.8
ubuntu
около 6 лет назад
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
CVSS3: 7.8
debian
около 6 лет назад
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, ...
EPSS
Процентиль: 68%
0.0056
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-125