First published: Sun Feb 10 2019(Updated: )
A heap-based buffer over-read was discovered in wasm::SExpressionParser::skipWhitespace() in wasm-s-parser.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm2js.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webassembly Binaryen | <64 | |
<64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-7701.
The affected software is Webassembly Binaryen.
The severity of CVE-2019-7701 is medium with a severity value of 6.5.
This vulnerability can be exploited by sending a crafted wasm input, leading to a segmentation fault and denial-of-service.
Yes, the fix for this vulnerability is available in version 1.38.23 or later of Binaryen.