CVE-2017-17819

In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.
References
Link Resource
http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af Patch Vendor Advisory
https://bugzilla.nasm.us/show_bug.cgi?id=3392435 Exploit Issue Tracking Tool Signature Vendor Advisory
https://usn.ubuntu.com/3694-1/ Third Party Advisory
http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af Patch Vendor Advisory
https://bugzilla.nasm.us/show_bug.cgi?id=3392435 Exploit Issue Tracking Tool Signature Vendor Advisory
https://usn.ubuntu.com/3694-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:nasm:netwide_assembler:2.14:rc0:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af - Patch, Vendor Advisory () http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af - Patch, Vendor Advisory
References () https://bugzilla.nasm.us/show_bug.cgi?id=3392435 - Exploit, Issue Tracking, Tool Signature, Vendor Advisory () https://bugzilla.nasm.us/show_bug.cgi?id=3392435 - Exploit, Issue Tracking, Tool Signature, Vendor Advisory
References () https://usn.ubuntu.com/3694-1/ - Third Party Advisory () https://usn.ubuntu.com/3694-1/ - Third Party Advisory

Information

Published : 2017-12-21 03:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17819

Mitre link : CVE-2017-17819

CVE.ORG link : CVE-2017-17819


JSON object : View

Products Affected

canonical

  • ubuntu_linux

nasm

  • netwide_assembler
CWE
CWE-476

NULL Pointer Dereference