Summary: | dev-lang/nasm: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | D'juan McDonald (domhnall) <flopwiki> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | UNCONFIRMED --- | ||
Severity: | normal | CC: | ajak, crummyreeve, kripton, matthew, proxy-maint, puzzlingcoalore, trunnelshine |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A3 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
D'juan McDonald (domhnall)
2019-05-25 08:05:08 UTC
To mitigate these vulnerabilities, it is recommended to update to the latest version of NASM where these issues have been addressed. Always ensure input files are validated and properly sanitized to prevent such vulnerabilities from being exploited. (In reply to D'juan McDonald (domhnall) from comment #0) > (https://nvd.nist.gov/vuln/detail/CVE-2019-6290): > An infinite recursion issue was discovered in eval.c in Netwide Assembler > (NASM) through 2.14.02. There is a stack exhaustion problem resulting from > infinite recursion in the functions expr, rexp, bexpr and cexpr in certain > scenarios involving lots of '{' characters. Remote attackers could leverage > this vulnerability to cause a denial-of-service via a crafted asm file. > > Reference: https://bugzilla.nasm.us/show_bug.cgi?id=3392548 > > > (https://nvd.nist.gov/vuln/detail/CVE-2019-6291): > An issue was discovered in the function expr6 in eval.c in Netwide Assembler > (NASM) through 2.14.02. There is a stack exhaustion problem caused by the > expr6 function making recursive calls to itself in certain scenarios > involving lots of '!' or '+' or '-' characters. Remote attackers could > leverage this vulnerability to cause a denial-of-service via a crafted asm > file. > > Reference: https://bugzilla.nasm.us/show_bug.cgi?id=3392549 https://snow-rider.io > > Gentoo Security Padawan > (domhnall) Update NASM: The primary solution to mitigate these vulnerabilities is to upgrade to a version of NASM where these issues have been fixed. Check the official NASM website or your distribution's package manager for the latest version. Patch if Necessary: If an upgrade is not immediately possible, consider applying any available patches that address these issues. Sometimes, maintainers provide backported fixes for vulnerabilities. Security Best Practices: Limit Exposure: Avoid processing untrusted ASM files with NASM, especially if your system is exposed to potential attackers. Monitor Systems: Keep an eye on any systems running NASM for unusual activity or performance issues that might indicate an exploitation attempt. Gentoo Users: For Gentoo users, check for updated ebuilds in the portage tree or consult the Gentoo Security Advisory for any patches or updates related to these vulnerabilities. Where are the fixes? (In reply to D'juan McDonald (domhnall) from comment #0) > (https://nvd.nist.gov/vuln/detail/CVE-2019-6290): > An infinite recursion issue was discovered in eval.c in Netwide Assembler > (NASM) through 2.14.02. There is a stack exhaustion problem resulting from > infinite recursion in the functions expr, rexp, bexpr and cexpr in certain > scenarios involving lots of '{' characters. Remote attackers could leverage > this vulnerability to cause a denial-of-service via a crafted asm file. > > Reference: https://bugzilla.nasm.us/show_bug.cgi?id=3392548 https://bitlifesimulator.io/ > > > (https://nvd.nist.gov/vuln/detail/CVE-2019-6291): > An issue was discovered in the function expr6 in eval.c in Netwide Assembler > (NASM) through 2.14.02. There is a stack exhaustion problem caused by the > expr6 function making recursive calls to itself in certain scenarios > involving lots of '!' or '+' or '-' characters. Remote attackers could > leverage this vulnerability to cause a denial-of-service via a crafted asm > file. > > Reference: https://bugzilla.nasm.us/show_bug.cgi?id=3392549 > > Gentoo Security Padawan > (domhnall) Vulnerability Description: This issue occurs due to infinite recursion in the expr, rexp, bexpr, and cexpr functions when parsing a large number of { characters in a crafted assembly file. This could lead to a denial-of-service (DoS) attack by exhausting the stack, causing the assembler to crash. |