| Titel | https://github.com/WebAssembly/wabt wabt v1.0.36 Heap-based Buffer Overflow |
|---|
| Beschreibung | A heap-buffer-overflow vulnerability arises in the wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport function defined in wabt/src/interp/binary-reader-interp.cc at line 693. This issue occurs when processing certain malformed files and calls the function FuncType::Clone() in the first case of the switch statement, leading to an out-of-bounds read and potential application crash, resulting in a read operation beyond the allocated memory. |
|---|
| Quelle | ⚠️ https://github.com/WebAssembly/wabt/issues/2556 |
|---|
| Benutzer | Anonymous User |
|---|
| Einreichung | 06.03.2025 08:35 (vor 1 Jahr) |
|---|
| Moderieren | 16.03.2025 13:49 (10 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 299867 [WebAssembly wabt 1.0.36 Malformed File binary-reader-interp.cc OnExport Pufferüberlauf] |
|---|
| Punkte | 20 |
|---|