First published: Tue Aug 22 2023(Updated: )
Heap-buffer-overflow in /src/wasm/wasm-binary.cpp in wasm::WasmBinaryBuilder::visitBlock(wasm::Block*) in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-opt.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webassembly Binaryen | =1.38.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-18382 is a heap-buffer-overflow vulnerability in the wasm::WasmBinaryBuilder::visitBlock function in Binaryen 1.38.26.
The severity of CVE-2020-18382 is medium with a CVSS score of 6.5.
CVE-2020-18382 can be exploited by using a crafted wasm input that causes a segmentation fault, leading to denial-of-service.
Binaryen version 1.38.26 is affected by CVE-2020-18382.
To fix CVE-2020-18382, update to a version of Binaryen that is not affected by the vulnerability.