First published: Mon Dec 09 2019(Updated: )
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VirusTotal yara | =3.11.0 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19648 has a severity rating that indicates a risk of Denial of Service or potential code execution.
To fix CVE-2019-19648, upgrade YARA to the latest version that addresses this vulnerability.
CVE-2019-19648 affects YARA version 3.11.0.
Yes, CVE-2019-19648 is relevant to Fedora versions 33 and 34.
Encountering CVE-2019-19648 can lead to application crashes or exploit opportunities through out-of-bounds memory access.