First published: Mon Dec 17 2018(Updated: )
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VirusTotal yara | =3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19975 is classified as a medium severity vulnerability due to the potential for arbitrary memory reads.
To fix CVE-2018-19975, update YARA to version 3.8.2 or later, where the vulnerability is resolved.
CVE-2018-19975 affects YARA version 3.8.1, specifically developed by VirusTotal.
The impact of CVE-2018-19975 includes the ability for crafted rules to exploit the bytecode execution and potentially expose sensitive data.
CVE-2018-19975 may be exploitable in environments where YARA 3.8.1 is used to process untrusted input.