Submit #525091: https://github.com/WebAssembly/wabt wabt 1.0.36 NULL Pointer Dereferenceinfo

Titlehttps://github.com/WebAssembly/wabt wabt 1.0.36 NULL Pointer Dereference
DescriptionA null pointer write vulnerability was discovered in the wabt::interp::(anonymous namespace)::BinaryReaderInterp::BeginFunctionBody function within glslang. This issue occurs when processing certain files, leading to a potential application crash. The vulnerability arises in the wabt::interp::(anonymous namespace)::BinaryReaderInterp::BeginFunctionBody function defined in src/interp/binary-reader-interp.cc at line 829. The reason is that the function BinaryReaderInterp::BeginFunctionBody did not check the validity of func_ before calling func_->code_offset, resulting in a null pointer dereference write.
Source⚠️ https://github.com/WebAssembly/wabt/issues/2565
User
 Anonymous User
Submission03/22/2025 13:59 (1 Year ago)
Moderation04/02/2025 15:37 (11 days later)
StatusAccepted
VulDB entry303013 [WebAssembly wabt 1.0.36 binary-reader-interp.cc BeginFunctionBody null pointer dereference]
Points20

Want to know what is going to be exploited?

We predict KEV entries!