A heap-based buffer over-read was found in the function OpCode (called from decompileSETMEMBER) in util/decompile.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file.
References
Link | Resource |
---|---|
http://somevulnsofadlab.blogspot.jp/2017/07/libmingheap-buffer-overflow-in-opcode_32.html | Third Party Advisory |
https://github.com/libming/libming/issues/82 | Third Party Advisory |
https://security.gentoo.org/glsa/201904-24 | Third Party Advisory |
http://somevulnsofadlab.blogspot.jp/2017/07/libmingheap-buffer-overflow-in-opcode_32.html | Third Party Advisory |
https://github.com/libming/libming/issues/82 | Third Party Advisory |
https://security.gentoo.org/glsa/201904-24 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://somevulnsofadlab.blogspot.jp/2017/07/libmingheap-buffer-overflow-in-opcode_32.html - Third Party Advisory | |
References | () https://github.com/libming/libming/issues/82 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201904-24 - Third Party Advisory |
Information
Published : 2017-07-29 05:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11728
Mitre link : CVE-2017-11728
CVE.ORG link : CVE-2017-11728
JSON object : View
Products Affected
libming
- ming
CWE
CWE-125
Out-of-bounds Read