SB2023122736 - Gentoo update for NASM



SB2023122736 - Gentoo update for NASM

Published: December 27, 2023

Security Bulletin ID SB2023122736
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2019-8343)

The vulnerability allows a local attacker to gain elevated privileges.

The vulnerability exists due to a use-after-free error in the paste_tokens function, as defined in the asm/preproc.c source code file. A local attacker can access the targeted system, make system calls that submit malicious input, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


2) Input validation error (CVE-ID: CVE-2020-21528)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the ieee_segment() function in outieee.c. A remote attacker can pass specially crafted assembly file to the compiler and perform a denial of service (DoS) attack.


3) Heap-based buffer overflow (CVE-ID: CVE-2022-44370)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the quote_for_pmake() function in asm/nasm.c. A remote attacker can pass specially crafted file to the compiler, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.