First published: Tue May 23 2023(Updated: )
WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webassembly Webassembly Binary Toolkit | =1.0.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31669 is a vulnerability in WebAssembly wat2wasm v1.0.32 that allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (").
Versions 1.0.32 of the WebAssembly Binary Toolkit (WebAssembly wat2wasm) are affected by CVE-2023-31669.
CVE-2023-31669 has a severity rating of 5.5, which is considered medium.
At the moment, there are no known patches or fixes available for CVE-2023-31669. It is recommended to follow the official advisories for updates.
You can find more information about CVE-2023-31669 on the GitHub issue page (https://github.com/WebAssembly/wabt/issues/2165) and on the Fedora Project mailing list archives (https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSFFCKXUQ5PAC5UVXY7N6HEHVQ3AC2RG/).