Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html | |
https://bugzilla.nasm.us/show_bug.cgi?id=3392521 | Exploit Issue Tracking Third Party Advisory |
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354 | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html | |
https://bugzilla.nasm.us/show_bug.cgi?id=3392521 | Exploit Issue Tracking Third Party Advisory |
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354 | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-11-12 19:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19214
Mitre link : CVE-2018-19214
CVE.ORG link : CVE-2018-19214
JSON object : View
Products Affected
redhat
- enterprise_linux
nasm
- netwide_assembler
CWE
CWE-125
Out-of-bounds Read