The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file.
{ "binaries": [ { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "libming-dev" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "libming-util" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "libming1" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "libswf-perl" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "ming-fonts-dejavu" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "ming-fonts-opensymbol" }, { "binary_version": "1:0.4.5-1.2ubuntu7", "binary_name": "python-ming" } ] }