First published: Fri Mar 21 2025(Updated: )
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebAssembly Binary Toolkit | ||
WebAssembly Binary Toolkit | =1.0.36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2584 has been declared as critical due to the potential for heap-based buffer overflow.
To mitigate CVE-2025-2584, update WebAssembly wabt to the latest version that addresses this vulnerability.
CVE-2025-2584 affects the WebAssembly wabt tool, specifically the BinaryReaderInterp::GetReturnCallDropKeepCount function.
CVE-2025-2584 is a heap-based buffer overflow vulnerability.
Yes, CVE-2025-2584 could potentially be exploited remotely, depending on the context in which the affected software is used.