| Title | https://github.com/WebAssembly/wabt wabt v1.0.36 Heap-based Buffer Overflow |
|---|
| Description | A heap-buffer-overflow vulnerability arises in the wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport function defined in wabt/src/interp/binary-reader-interp.cc at line 693. This issue occurs when processing certain malformed files and calls the function FuncType::Clone() in the first case of the switch statement, leading to an out-of-bounds read and potential application crash, resulting in a read operation beyond the allocated memory. |
|---|
| Source | ⚠️ https://github.com/WebAssembly/wabt/issues/2556 |
|---|
| User | Anonymous User |
|---|
| Submission | 03/06/2025 08:35 (1 Year ago) |
|---|
| Moderation | 03/16/2025 13:49 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 299867 [WebAssembly wabt 1.0.36 Malformed File binary-reader-interp.cc OnExport heap-based overflow] |
|---|
| Points | 20 |
|---|