| 标题 | https://github.com/WebAssembly/wabt wabt v1.0.36 Heap-based Buffer Overflow |
|---|
| 描述 | A heap-buffer-overflow vulnerability arises in the wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport function defined in wabt/src/interp/binary-reader-interp.cc at line 693. This issue occurs when processing certain malformed files and calls the function FuncType::Clone() in the first case of the switch statement, leading to an out-of-bounds read and potential application crash, resulting in a read operation beyond the allocated memory. |
|---|
| 来源 | ⚠️ https://github.com/WebAssembly/wabt/issues/2556 |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2025-03-06 08時35分 (1 年前) |
|---|
| 管理 | 2025-03-16 13時49分 (10 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 299867 [WebAssembly wabt 1.0.36 Malformed File binary-reader-interp.cc OnExport 内存损坏] |
|---|
| 积分 | 20 |
|---|