Page 8 of 41 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service. En Netwide Assembler (NASM) 2.14rc0 hay un acceso ilegal a dirección en la función paste_tokens() en preproc.c, también llamado desreferencia de puntero NULL. Esto conducirá a un ataque de denegación de servicio remoto. • https://bugzilla.nasm.us/show_bug.cgi?id=3392423 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. En Netwide Assembler (NASM) versión 2.14rc0, el archivo preproc.c permite a los atacantes remotos causar una denegación de servicio (desbordamiento de búfer en la región heap de la memoria y bloqueo de la aplicación) o posiblemente tener otro impacto no especificado por medio de un archivo creado. • https://bugzilla.nasm.us/show_bug.cgi?id=3392415 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 1

In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack. En Netwide Assembler (NASM) versión 2.14rc0, existen múltiples vulnerabilidades de acceso a la región heap de la memoria previamente liberada en la herramienta nasm. • https://bugzilla.nasm.us/show_bug.cgi?id=3392414 https://security.gentoo.org/glsa/201903-19 https://usn.ubuntu.com/3694-1 • CWE-416: Use After Free •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in the listing module in Netwide Assembler (NASM) before 2.03.01 has unknown impact and attack vectors, a different vulnerability than CVE-2008-2719. Desbordamiento de buffer en el módulo listing en Netwide Assembler (NASM) anterior v2.03.01 tiene impacto desconocido y vectores atacados, una vulnerabilidad diferente que CVE-2008-2719. • http://secunia.com/advisories/30836 http://sourceforge.net/project/shownotes.php?release_id=607497 http://www.securityfocus.com/bid/29955 http://www.securitytracker.com/id?1020378 http://www.vupen.com/english/advisories/2008/1939 https://bugzilla.redhat.com/show_bug.cgi?id=452800 https://exchange.xforce.ibmcloud.com/vulnerabilities/43441 https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01000.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 1

Off-by-one error in the ppscan function (preproc.c) in Netwide Assembler (NASM) 2.02 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted file that triggers a stack-based buffer overflow. Error de superación de límite (off-by-one) en la función ppscan (prepoc.c) de Netwide Assembler (NASM) 2.02; permite a atacantes dependientes del contexto provocar una denegación de servicio (caída) y puede que ejecutar código de su elección mediante un fichero manipulado que produce un desbordamiento del búfer basado en pila. • https://www.exploit-db.com/exploits/31903 http://repo.or.cz/w/nasm.git?a=commit%3Bh=76ec8e73db16f4cf1453a142d03bcc74d528f72f http://secunia.com/advisories/30594 http://secunia.com/advisories/32059 http://www.mandriva.com/security/advisories?name=MDVSA-2008:120 http://www.openwall.com/lists/oss-security/2008/06/11/4 http://www.openwall.com/lists/oss-security/2008/06/11/5 http://www.securityfocus.com/bid/29656 http://www.securitytracker.com/id?1020259 http://www.ubuntu.com • CWE-189: Numeric Errors •