The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1343-1 | ming security update |
EUVD |
EUVD-2018-20762 | The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:17:51.774Z
Reserved: 2018-04-01T00:00:00
Link: CVE-2018-9165
No data.
Status : Modified
Published: 2018-04-01T18:29:00.570
Modified: 2024-11-21T04:15:07.013
Link: CVE-2018-9165
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD