mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 17:50:34 +00:00
27 lines
1.1 KiB
Markdown
27 lines
1.1 KiB
Markdown
![]() |
### [CVE-2019-7581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7581)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/libming/libming/issues/173
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ICSE2020-MemLock/MemLock_Benchmark
|
||
|
- https://github.com/SZU-SE/MemLock_Benchmark
|
||
|
- https://github.com/SZU-SE/Uncontrolled-allocation-Fuzzer-TestSuite
|
||
|
- https://github.com/tzf-key/MemLock_Benchmark
|
||
|
- https://github.com/tzf-omkey/MemLock_Benchmark
|
||
|
- https://github.com/waugustus/crash_analysis
|
||
|
- https://github.com/waugustus/poc
|
||
|
- https://github.com/waugustus/waugustus
|
||
|
- https://github.com/wcventure/MemLock_Benchmark
|
||
|
|