Vulnerability Description
Wasm3 0.5.0 has a heap-based buffer overflow in op_Const64 (called from EvaluateExpression and m3_LoadModule).
CVSS Score
7.5
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wasm3 Project | Wasm3 | 0.5.0 |
Related Weaknesses (CWE)
References
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33554Issue TrackingThird Party Advisory
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wasm3/OSV-2021-676.yamlThird Party Advisory
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33554Issue TrackingThird Party Advisory
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wasm3/OSV-2021-676.yamlThird Party Advisory
FAQ
What is CVE-2021-38592?
CVE-2021-38592 is a vulnerability with a CVSS score of 7.5 (HIGH). Wasm3 0.5.0 has a heap-based buffer overflow in op_Const64 (called from EvaluateExpression and m3_LoadModule).
How severe is CVE-2021-38592?
CVE-2021-38592 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-38592?
Check the references section above for vendor advisories and patch information. Affected products include: Wasm3 Project Wasm3.