### [CVE-2018-19975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19975) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In YARA 3.8.1, bytecode in a specially crafted compiled rule can read data from any arbitrary address in memory, in libyara/exec.c. Specifically, OP_COUNT can read a DWORD. ### POC #### Reference - https://bnbdr.github.io/posts/extracheese/ - https://bnbdr.github.io/posts/extracheese/ - https://github.com/VirusTotal/yara/issues/999 - https://github.com/VirusTotal/yara/issues/999 - https://github.com/bnbdr/swisscheese/ - https://github.com/bnbdr/swisscheese/ #### Github - https://github.com/bnbdr/swisscheese