CVE-2017-10686

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-10686
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-10686.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-10686
Related
Published
2017-06-29T23:29:00Z
Modified
2024-09-18T01:00:20Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by ppgetline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in deleteToken(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.

References

Affected packages

Debian:11 / nasm

Package

Name
nasm
Purl
pkg:deb/debian/nasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.02-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / nasm

Package

Name
nasm
Purl
pkg:deb/debian/nasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.02-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nasm

Package

Name
nasm
Purl
pkg:deb/debian/nasm?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.02-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/netwide-assembler/nasm

Affected ranges

Type
GIT
Repo
https://github.com/netwide-assembler/nasm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected