First published: Thu Feb 18 2021(Updated: )
An integer overflow and several buffer overflow reads in libyara/modules/macho/macho.c in YARA v4.0.3 and earlier could allow an attacker to either cause denial of service or information disclosure via a malicious Mach-O file. Affects all versions before libyara 4.0.4
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libyara | <4.0.4 | 4.0.4 |
VirusTotal yara | <4.0.4 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3402 is classified as a high severity vulnerability due to its potential for causing denial of service and information disclosure.
To fix CVE-2021-3402, upgrade to libyara version 4.0.4 or later.
CVE-2021-3402 affects all versions of libyara before 4.0.4.
CVE-2021-3402 contains an integer overflow and multiple buffer overflow reads.
CVE-2021-3402 specifically involves the macho.c file within the libyara/modules/macho directory.