First published: Thu Dec 21 2017(Updated: )
In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer overflow that will cause a remote denial of service attack, related to a strcpy in paste_tokens in asm/preproc.c, a similar issue to CVE-2017-11111.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =2.14-rc0 | |
Canonical Ubuntu Linux | =14.04 | |
debian/nasm | 2.15.05-1 2.16.01-1 2.16.03-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17811 is a heap-based buffer overflow vulnerability in Netwide Assembler (NASM) 2.14rc0.
CVE-2017-17811 can cause a remote denial of service attack due to a heap-based buffer overflow in NASM 2.14rc0.
NASM versions 2.14-1, 2.15.05-1, and 2.16.01-1, as well as Ubuntu versions 14.04, 16.04, and 17.10 with specific package versions of NASM, are affected.
To fix CVE-2017-17811, update to NASM version 2.14-1, 2.15.05-1, or 2.16.01-1, or follow the recommended updates for Ubuntu versions 14.04, 16.04, and 17.10.
You can find more information about CVE-2017-17811 in the references provided: [Bugzilla](https://bugzilla.nasm.us/show_bug.cgi?id=3392432), [Ubuntu Security Notice](https://usn.ubuntu.com/3694-1/), [Launchpad CVE](https://launchpad.net/bugs/cve/CVE-2017-17811).