First published: Thu Sep 13 2018(Updated: )
Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =12.14-rc15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Netwide Assembler (NASM) vulnerability is CVE-2018-16999.
The severity of CVE-2018-16999 is medium.
CVE-2018-16999 allows attackers to cause a denial of service in Netwide Assembler (NASM) by exploiting an invalid memory write vulnerability.
To fix the CVE-2018-16999 vulnerability in Netwide Assembler (NASM), it is recommended to upgrade to a patched version of NASM.
Yes, you can find additional information about CVE-2018-16999 in the references provided: http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html, http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html, and https://bugzilla.nasm.us/show_bug.cgi?id=3392508.