Логотип exploitDog
bind:CVE-2023-26489
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26489

Количество 4

Количество 4

nvd логотип

CVE-2023-26489

почти 3 года назад

wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly's defined 33-bit effective address. This bug means that, with default codegen settings, a wasm-controlled load/store operation could read/write addresses up to 35 bits away from the base of linear memory. Due to this bug, however, addresses up to `0xffffffff * 8 + 0x7ffffffc = 36507222004 = ~34G` bytes away from the base of linear memory are possible from guest code. This means that the virtual memory 6G away from the base of linear memory up to ~34G away can be read/written by a malicious module. A guest module can, without the knowledge of the embedder, read/write memory in this region. The memory may belong to other WebAssembly instances when using the pooling allocator, for example. Affected embedders are recommended to analyze preexist

CVSS3: 9.9
EPSS: Низкий
debian логотип

CVE-2023-26489

почти 3 года назад

wasmtime is a fast and secure runtime for WebAssembly. In affected ver ...

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-ff4p-7xrq-q5r8

почти 3 года назад

wasmtime vulnerable to guest-controlled out-of-bounds read/write on x86_64

CVSS3: 9.9
EPSS: Низкий
fstec логотип

BDU:2023-01929

почти 3 года назад

Уязвимость компилятора Cranelift (ранее Cretonne) среды выполнения для WebAssembly-приложений Wasmtime, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26489

wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly's defined 33-bit effective address. This bug means that, with default codegen settings, a wasm-controlled load/store operation could read/write addresses up to 35 bits away from the base of linear memory. Due to this bug, however, addresses up to `0xffffffff * 8 + 0x7ffffffc = 36507222004 = ~34G` bytes away from the base of linear memory are possible from guest code. This means that the virtual memory 6G away from the base of linear memory up to ~34G away can be read/written by a malicious module. A guest module can, without the knowledge of the embedder, read/write memory in this region. The memory may belong to other WebAssembly instances when using the pooling allocator, for example. Affected embedders are recommended to analyze preexist

CVSS3: 9.9
2%
Низкий
почти 3 года назад
debian логотип
CVE-2023-26489

wasmtime is a fast and secure runtime for WebAssembly. In affected ver ...

CVSS3: 9.9
2%
Низкий
почти 3 года назад
github логотип
GHSA-ff4p-7xrq-q5r8

wasmtime vulnerable to guest-controlled out-of-bounds read/write on x86_64

CVSS3: 9.9
2%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01929

Уязвимость компилятора Cranelift (ранее Cretonne) среды выполнения для WebAssembly-приложений Wasmtime, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.9
2%
Низкий
почти 3 года назад

Уязвимостей на страницу