Stack-based Buffer Overflow in NASM Disassembly Output Formatting
CVE-2026-6069

7.5HIGH

Key Information:

Vendor

Nasm

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-6069?

The NASM product is affected by a stack-based buffer overflow in its disasm() function. This vulnerability occurs due to improper handling of disassembly output formatting, where an attacker can exploit the buffer capacity by exceeding the slen, resulting in an out-of-bounds write. This flaw could be exploited to execute arbitrary code or crash the application, posing a significant risk to systems utilizing NASM.

Affected Version(s)

NASM nasm-3.02rc5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.