Описание
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
A flaw was found in WebAssembly WABT's BinaryReaderInterp component. This vulnerability allows remote attackers to cause a heap-based buffer overflow and potentially crash the application via specially crafted WebAssembly files lacking proper formatting, due to missing boundary checks in the GetReturnCallDropKeepCount function.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | firefox | Not affected | ||
Red Hat Enterprise Linux 10 | thunderbird | Not affected | ||
Red Hat Enterprise Linux 7 | firefox | Not affected | ||
Red Hat Enterprise Linux 7 | thunderbird | Not affected | ||
Red Hat Enterprise Linux 8 | firefox | Not affected | ||
Red Hat Enterprise Linux 8 | thunderbird | Not affected | ||
Red Hat Enterprise Linux 9 | firefox | Not affected | ||
Red Hat Enterprise Linux 9 | firefox:flatpak/firefox | Not affected | ||
Red Hat Enterprise Linux 9 | thunderbird | Under investigation | ||
Red Hat Enterprise Linux 9 | thunderbird:flatpak/thunderbird | Under investigation |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
5 Medium
CVSS3
Связанные уязвимости
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
A vulnerability was found in WebAssembly wabt 1.0.36. It has been decl ...
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
5 Medium
CVSS3