Description
In YARA 3.8.1, bytecode in a specially crafted compiled rule is exposed to information about its environment, in libyara/exec.c. This is a consequence of the design of the YARA virtual machine.
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://bnbdr.github.io/posts/extracheese/
Exploit, Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/VirusTotal/yara/issues/999
Exploit, Third Party Advisory x_refsource_misc
https://github.com/bnbdr/swisscheese/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFFXDAMP6GJ337LIOTVF5I4T6QGMN3ZR/
Scores
CVSS v3
5.5
EPSS
0.0014
EPSS Percentile
34.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
virustotal/yara
3.8.1
Published
Dec 17, 2018
Tracked Since
Feb 18, 2026