Vulnerabilities > CVE-2020-36405 - Use After Free vulnerability in Keystone-Engine Keystone Engine 0.9.2
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Keystone Engine 0.9.2 has a use-after-free in llvm_ks::X86Operand::getToken.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Common Weakness Enumeration (CWE)
References
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22850
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22850
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/keystone/OSV-2020-789.yaml
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/keystone/OSV-2020-789.yaml
- https://github.com/keystone-engine/keystone/releases
- https://github.com/keystone-engine/keystone/releases