First published: Thu Dec 20 2018(Updated: )
nasm version 2.14.01rc5, 2.15 contains a Buffer Overflow vulnerability in asm/stdscan.c:130 that can result in Stack-overflow caused by triggering endless macro generation, crash the program. This attack appear to be exploitable via a crafted nasm input file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =2.14.01rc5 | |
Nasm Netwide Assembler | =2.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-1000886.
The affected software is Nasm Netwide Assembler version 2.14.01rc5 and 2.15.
The severity of CVE-2018-1000886 is medium with a CVSS score of 5.5.
The vulnerability can be exploited by triggering endless macro generation in a crafted nasm input file, leading to a stack overflow and program crash.
Yes, it is recommended to update to a version of Nasm Netwide Assembler that has fixed the Buffer Overflow vulnerability.