Out-of-bounds Write Affecting wasmi package, versions >=0.15.0 <0.31.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-WASMI-6419446
  • published8 Mar 2024
  • disclosed7 Mar 2024
  • creditStellar Development Foundation

Introduced: 7 Mar 2024

CVE-2024-28123  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade wasmi to version 0.31.1 or higher.

Overview

wasmi is a WebAssembly interpreter.

Affected versions of this package are vulnerable to Out-of-bounds Write when the host calls the Wasm function with more than 128 parameters. An attacker can exploit this vulnerability by calling or resuming this function with parameters exceeding the default limit, leading to potential code execution or information disclosure.

Note:

This vulnerability does not affect calls from Wasm to Wasm, but only from host to Wasm.

Workaround

Ensure no more than 128 parameters can be passed in a call from the host to a Wasm function.

CVSS Scores

version 3.1