YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
References
Link | Resource |
---|---|
https://github.com/yasm/yasm/issues/206 | Exploit Issue Tracking Third Party Advisory |
https://github.com/yasm/yasm/issues/206 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yasm/yasm/issues/206 - Exploit, Issue Tracking, Third Party Advisory |
14 May 2024, 13:03
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. |
Information
Published : 2023-04-25 16:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30402
Mitre link : CVE-2023-30402
CVE.ORG link : CVE-2023-30402
JSON object : View
Products Affected
yasm_project
- yasm
CWE
CWE-787
Out-of-bounds Write