Description
In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://bnbdr.github.io/posts/extracheese/
Exploit, Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/VirusTotal/yara/issues/999
Exploit, Third Party Advisory x_refsource_misc
https://github.com/bnbdr/swisscheese/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFFXDAMP6GJ337LIOTVF5I4T6QGMN3ZR/
Scores
CVSS v3
5.5
EPSS
0.0025
EPSS Percentile
48.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-908
Status
published
Products (1)
virustotal/yara
3.8.1
Published
Dec 17, 2018
Tracked Since
Feb 18, 2026