Bug 2235688 (CVE-2023-40857) - CVE-2023-40857 yara: buffer overflow that allows a remote attacker to execute arbtirary code via the yr_execute_cod function
Summary: CVE-2023-40857 yara: buffer overflow that allows a remote attacker to execute...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2023-40857
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2235690 2235691 2235772 2235773
Blocks: 2235693
TreeView+ depends on / blocked
 
Reported: 2023-08-29 13:23 UTC by Marian Rehak
Modified: 2023-11-09 16:56 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the yara library. This issue occurs due to a buffer overflow vulnerability in the exe.c component that allows a remote attacker to execute arbtirary code via the yr_execute_cod function.
Clone Of:
Environment:
Last Closed: 2023-08-31 12:13:31 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2023-08-29 13:23:25 UTC
Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component.

https://github.com/VirusTotal/yara/issues/1945

Comment 2 Sandipan Roy 2023-08-29 17:07:49 UTC
As per upstream discussion this is not security issue or even a normal issue, 
Untrusted yara rules not supported by its design.

See, 
https://github.com/VirusTotal/yara/issues/1948
https://github.com/VirusTotal/yara/issues/891

Comment 3 Sandipan Roy 2023-08-29 17:15:06 UTC
Created yara tracking bugs for this issue:

Affects: epel-all [bug 2235772]
Affects: fedora-all [bug 2235773]

Comment 4 Mark Huth 2023-08-31 12:13:31 UTC
The Insights Malware app only supports running the rules file we provide to the customer.  We ensure the rules file we provide runs without failure by yara is not corrupted.  We can't do much about customers choosing to run their own rules files and crashing yara if the rules file they provide is corrupt.  That is not supported by the malware app.  And it also seems that the Yara maintainers themselves see this as a problem they are willing to accept and won't be fixing.  The upstream issue mentioned in the first comment - https://github.com/VirusTotal/yara/issues/1945 - has been closed as essentially WONTFIX.  As a result, I'm going to close the bugzilla WONTFIX as well.


Note You need to log in before you can comment on or make changes to this bug.