Vulnerability Description
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Virustotal | Yara | 3.8.1 |
Related Weaknesses (CWE)
References
- https://bnbdr.github.io/posts/extracheese/ExploitThird Party Advisory
- https://github.com/VirusTotal/yara/issues/999ExploitIssue TrackingThird Party Advisory
- https://github.com/bnbdr/swisscheese/ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://bnbdr.github.io/posts/extracheese/ExploitThird Party Advisory
- https://github.com/VirusTotal/yara/issues/999ExploitIssue TrackingThird Party Advisory
- https://github.com/bnbdr/swisscheese/ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2018-19974?
CVE-2018-19974 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not...
How severe is CVE-2018-19974?
CVE-2018-19974 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19974?
Check the references section above for vendor advisories and patch information. Affected products include: Virustotal Yara.