First published: Thu Dec 21 2017(Updated: )
In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =2.14-rc0 | |
Canonical Ubuntu Linux | =14.04 | |
debian/nasm | 2.15.05-1 2.16.01-1 2.16.03-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-17819.
The severity level of CVE-2017-17819 is medium, with a severity value of 5.5.
The function find_cc() in asm/preproc.c is affected by CVE-2017-17819.
The vulnerability in Netwide Assembler (NASM) 2.14rc0 can be exploited by causing a remote denial of service attack through an illegal address access in the function find_cc().
Yes, there are fixes available. For Ubuntu, the version 2.13.02 is a known fix. For Debian, versions 2.14-1, 2.15.05-1, and 2.16.01-1 are known fixes.