An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer dereference) or possibly have unspecified other impact by crafting certain WebAssembly files.
References
Link | Resource |
---|---|
https://github.com/WAVM/WAVM/issues/110#issuecomment-421764693 | Exploit Patch Third Party Advisory |
https://github.com/WAVM/WAVM/commit/31d670b6489e6d708c3b04b911cdf14ac43d846d | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-09-21 00:29
Updated : 2018-11-21 10:09
NVD link : CVE-2018-17293
Mitre link : CVE-2018-17293
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
webassembly_virtual_machine_project
- webassembly_virtual_machine