Vulnerability Details : CVE-2018-1000667
NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file..
Vulnerability category: OverflowMemory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2018-1000667
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 47 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-1000667
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2018-1000667
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-1000667
-
https://bugzilla.nasm.us/show_bug.cgi?id=3392507
3392507 – memory corruption of nasm when handling a crafed file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482Exploit;Issue Tracking;Third Party Advisory
-
https://github.com/cyrillos/nasm/issues/3
Page not found · GitHub · GitHubExploit;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
[security-announce] openSUSE-SU-2020:0954-1: moderate: Security update f
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
[security-announce] openSUSE-SU-2020:0952-1: moderate: Security update f
Products affected by CVE-2018-1000667
- cpe:2.3:a:nasm:netwide_assembler:*:*:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc10:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc11:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc12:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc13:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc7:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc9:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc14:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc8:*:*:*:*:*:*
- cpe:2.3:a:nasm:netwide_assembler:2.14.0:rc15:*:*:*:*:*:*