First published: Wed Apr 02 2025(Updated: )
A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebAssembly Binary Toolkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3122 is classified as a problematic vulnerability due to its potential to cause application crashes.
To fix CVE-2025-3122, you should update to the latest version of WebAssembly wabt where the vulnerability has been patched.
CVE-2025-3122 exploits a null pointer dereference in the BinaryReaderInterp::BeginFunctionBody function.
CVE-2025-3122 affects WebAssembly wabt version 1.0.36 and possibly earlier versions.
The potential consequences of CVE-2025-3122 include application instability and crashes due to the null pointer dereference.