SB2023082133 - Multiple vulnerabilities in WebAssembly
Published: August 21, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2023-27115)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in wabt::cat_compute_size. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and perform a denial of service (DoS) attack.
2) Out-of-bounds write (CVE-ID: CVE-2023-27117)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in wabt::Node::operator. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
3) Input validation error (CVE-ID: CVE-2023-27119)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in wabt::Decompiler::WrapChild. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
4) Heap-based buffer overflow (CVE-ID: CVE-2022-43281)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in wasm-interp. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow via the component std::vector>::size() at /bits/stl_vector.h and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Improper Encoding or Escaping of Output (CVE-ID: CVE-2023-31669)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation. A remote attacker can crash the application.
6) Infinite loop (CVE-ID: CVE-2023-30300)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop. A remote attacker can consume all available system resources and cause denial of service conditions.
7) Input validation error (CVE-ID: CVE-2023-27116)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in CWriter::MangleType(). A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/WebAssembly/wabt/issues/1992
- https://github.com/WebAssembly/wabt/issues/1938
- https://github.com/WebAssembly/wabt/issues/1989
- https://github.com/WebAssembly/wabt/issues/1990
- https://github.com/WebAssembly/wabt/issues/1981
- https://github.com/WebAssembly/wabt/issues/2165
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSFFCKXUQ5PAC5UVXY7N6HEHVQ3AC2RG/
- https://github.com/WebAssembly/wabt/issues/2180
- https://github.com/WebAssembly/wabt/issues/1984