Page 7 of 37 results (0.410 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_getline in asm/preproc.c that will cause a remote denial of service attack. En Netwide Assembler (NASM) 2.14rc0, existe una vulnerabilidad de uso de memoria previamente liberada en pp_getline en asm/preproc.c que podría provocar un ataque de denegación de servicio (DoS) remoto. • https://bugzilla.nasm.us/show_bug.cgi?id=3392426 https://usn.ubuntu.com/3694-1 • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service. En Netwide Assembler (NASM) 2.14rc0 hay un acceso ilegal a dirección en la función paste_tokens() en preproc.c, también llamado desreferencia de puntero NULL. Esto conducirá a un ataque de denegación de servicio remoto. • https://bugzilla.nasm.us/show_bug.cgi?id=3392423 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. En Netwide Assembler (NASM) versión 2.14rc0, el archivo preproc.c permite a los atacantes remotos causar una denegación de servicio (desbordamiento de búfer en la región heap de la memoria y bloqueo de la aplicación) o posiblemente tener otro impacto no especificado por medio de un archivo creado. • https://bugzilla.nasm.us/show_bug.cgi?id=3392415 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 1

In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack. En Netwide Assembler (NASM) versión 2.14rc0, existen múltiples vulnerabilidades de acceso a la región heap de la memoria previamente liberada en la herramienta nasm. • https://bugzilla.nasm.us/show_bug.cgi?id=3392414 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-416: Use After Free •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the listing module in Netwide Assembler (NASM) before 2.03.01 has unknown impact and attack vectors, a different vulnerability than CVE-2008-2719. Desbordamiento de buffer en el módulo listing en Netwide Assembler (NASM) anterior v2.03.01 tiene impacto desconocido y vectores atacados, una vulnerabilidad diferente que CVE-2008-2719. • http://secunia.com/advisories/30836 http://sourceforge.net/project/shownotes.php?release_id=607497 http://www.securityfocus.com/bid/29955 http://www.securitytracker.com/id?1020378 http://www.vupen.com/english/advisories/2008/1939 https://bugzilla.redhat.com/show_bug.cgi?id=452800 https://exchange.xforce.ibmcloud.com/vulnerabilities/43441 https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01000.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •