The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file.
{
"binaries": [
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "libming-dev"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "libming-util"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "libming1"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "libswf-perl"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "ming-fonts-dejavu"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "ming-fonts-opensymbol"
},
{
"binary_version": "1:0.4.5-1.2ubuntu7",
"binary_name": "python-ming"
}
]
}