CVE-2018-16764

In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an IR::FunctionValidationContext::catch_all heap-based buffer over-read.
References
Link Resource
https://github.com/AndrewScheidecker/WAVM/issues/93 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/AndrewScheidecker/WAVM/issues/93 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webassembly_virtual_machine_project:webassembly_virtual_machine:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () https://github.com/AndrewScheidecker/WAVM/issues/93 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/AndrewScheidecker/WAVM/issues/93 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2018-09-10 04:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16764

Mitre link : CVE-2018-16764

CVE.ORG link : CVE-2018-16764


JSON object : View

Products Affected

webassembly_virtual_machine_project

  • webassembly_virtual_machine
CWE
CWE-125

Out-of-bounds Read