ATasm 1.06 has a stack-based buffer overflow in the parse_expr() function in setparse.c via a crafted .m65 file.
References
Link | Resource |
---|---|
https://sourceforge.net/p/atasm/bugs/9/ | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJYUV3PKSIGBZGJ6PXAGTT2LW6HLPMS/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6XQMOLMWHUDBN3PQJYGVULLNUBMGGJH/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUABDG4CEAY2FVPM3CFFCZMOKSTEKGXX/ | Mailing List Third Party Advisory |
Information
Published : 2019-12-13 08:15
Updated : 2022-10-14 11:51
NVD link : CVE-2019-19786
Mitre link : CVE-2019-19786
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
atasm_project
- atasm
fedoraproject
- fedora