Note:
This project will be discontinued after December 13, 2021. [more]
2018-12-17
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
Products | Yara |
Type | Use of Uninitialized Resource (CWE-908) |
First patch | - None (likely due to unavailable code) |
Links |
• https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFFXDAMP6GJ337LIOTVF5I4T6QGMN3ZR/
• https://bnbdr.github.io/posts/extracheese/ • https://github.com/bnbdr/swisscheese/ • https://github.com/VirusTotal/yara/issues/999 |