CVE-2019-19648

Priority
Description
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0,
command_size may be inconsistent with the real size. A specially crafted
MachO file can cause an out-of-bounds memory access, resulting in Denial of
Service (application crash) or potential code execution.
Notes
amurrayWhilst the description claims code-execution, this is only an out-of-bounds read so just a denial of service.
Package
Source: yara (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):needs-triage
Ubuntu 20.10 (Groovy Gorilla):needs-triage
More Information

Updated: 2020-07-28 18:56:46 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)