First published: Mon Oct 16 2017(Updated: )
The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Radare2 | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-15368 is classified as a denial of service vulnerability that can lead to an application crash.
To fix CVE-2017-15368, upgrade to a version of radare2 that addresses this vulnerability beyond 2.0.0.
CVE-2017-15368 allows remote attackers to exploit a crafted WASM file leading to stack-based buffer over-read.
CVE-2017-15368 affects radare2 version 2.0.0.
Exploiting CVE-2017-15368 can cause a denial of service and potentially other unspecified impacts.