Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html | |
https://bugzilla.nasm.us/show_bug.cgi?id=3392521 | Exploit Issue Tracking Third Party Advisory |
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354 | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html | |
https://bugzilla.nasm.us/show_bug.cgi?id=3392521 | Exploit Issue Tracking Third Party Advisory |
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html - | |
References | () https://bugzilla.nasm.us/show_bug.cgi?id=3392521 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354 - Patch, Third Party Advisory |
Information
Published : 2018-11-12 19:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19214
Mitre link : CVE-2018-19214
CVE.ORG link : CVE-2018-19214
JSON object : View
Products Affected
nasm
- netwide_assembler
redhat
- enterprise_linux
CWE
CWE-125
Out-of-bounds Read