Vulnerability Description
Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or possibly have unspecified other impact via a crafted ELF file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nasm | Netwide Assembler | 2.13 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
- https://sourceforge.net/p/nasm/bugs/561/ExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
- https://sourceforge.net/p/nasm/bugs/561/ExploitThird Party Advisory
FAQ
What is CVE-2018-10254?
CVE-2018-10254 is a vulnerability with a CVSS score of 7.8 (HIGH). Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or ...
How severe is CVE-2018-10254?
CVE-2018-10254 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10254?
Check the references section above for vendor advisories and patch information. Affected products include: Nasm Netwide Assembler.