CVE-2019-19648

Priority
Description
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0,
command_size may be inconsistent with the real size. A specially crafted
MachO file can cause an out-of-bounds memory access, resulting in Denial of
Service (application crash) or potential code execution.
Notes
amurrayWhilst the description claims code-execution, this is only an out-of-bounds read so just a denial of service.
Package
Source: yara (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-01-29 19:00:36 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)