CVE-2025-2368
Publication date 17 March 2025
Last updated 17 March 2025
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
wabt | 24.10 oracular |
Needs evaluation
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-2368
- https://github.com/WebAssembly/wabt/issues/2556
- https://github.com/WebAssembly/wabt/issues/2537
- https://github.com/WebAssembly/wabt/issues/2556#issue-2899598349
- https://github.com/WebAssembly/wabt/pull/2541
- https://vuldb.com/?ctiid.299867
- https://vuldb.com/?id.299867
- https://vuldb.com/?submit.515327