Out-of-Bounds Affecting wabt package, versions *


Severity

Recommended
low

Based on Debian security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-WABT-9480059
  • published18 Mar 2025
  • disclosed17 Mar 2025

Introduced: 17 Mar 2025

NewCVE-2025-2368  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable wabt.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wabt package and not the wabt package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

CVSS Base Scores

version 3.1