Vulnerability Description
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Virustotal | Yara | 3.8.1 |
Related Weaknesses (CWE)
References
- https://bnbdr.github.io/posts/extracheese/ExploitThird Party Advisory
- https://github.com/VirusTotal/yara/issues/999ExploitIssue TrackingThird Party Advisory
- https://github.com/bnbdr/swisscheese/ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://bnbdr.github.io/posts/extracheese/ExploitThird Party Advisory
- https://github.com/VirusTotal/yara/issues/999ExploitIssue TrackingThird Party Advisory
- https://github.com/bnbdr/swisscheese/ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2018-19975?
CVE-2018-19975 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD.
How severe is CVE-2018-19975?
CVE-2018-19975 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19975?
Check the references section above for vendor advisories and patch information. Affected products include: Virustotal Yara.