First published: Wed Jan 04 2023(Updated: )
NASM v2.16 was discovered to contain a global buffer overflow in the component dbgdbg_typevalue at /output/outdbg.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nasm Netwide Assembler | =2.16 | |
Nasm Netwide Assembler | =2.16-rc10 | |
Nasm Netwide Assembler | =2.16-rc11 | |
Nasm Netwide Assembler | =2.16-rc12 | |
Nasm Netwide Assembler | =2.16-rc4 | |
Nasm Netwide Assembler | =2.16-rc5 | |
Nasm Netwide Assembler | =2.16-rc6 | |
Nasm Netwide Assembler | =2.16-rc7 | |
Nasm Netwide Assembler | =2.16-rc8 | |
Nasm Netwide Assembler | =2.16-rc9 | |
Nasm Netwide Assembler | =2.16.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46456 is a global buffer overflow vulnerability discovered in NASM v2.16.
The component dbgdbg_typevalue at /output/outdbg.c is affected by CVE-2022-46456.
CVE-2022-46456 has a severity rating of medium with a CVSS score of 6.1.
To mitigate CVE-2022-46456, update to the latest version of NASM that includes the fix for this vulnerability, which is version 2.16.01 or higher.
You can find more information about CVE-2022-46456 at the following reference: https://bugzilla.nasm.us/show_bug.cgi?id=3392814