WebAssembly wat2wasm Vulnerability in Version 1.0.32 Affects Security
CVE-2023-31669

5.5MEDIUM

Key Information:

Vendor
CVE Published:
23 May 2023

What is CVE-2023-31669?

A security issue in WebAssembly's wat2wasm version 1.0.32 allows attackers to exploit input handling by placing an '@' symbol immediately before a double quote ('"'), which may result in a crash of the libc++abi.dylib. This vulnerability poses a risk to applications utilizing this version, leading to potential downtime and instability. Users and developers should take immediate measures to patch affected systems to mitigate exposure.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-31669 : WebAssembly wat2wasm Vulnerability in Version 1.0.32 Affects Security