Heap buffer overflow in the yrobjectarraysetitem() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libyara-dev", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "libyara3", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "libyara3-dbgsym", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara-dbgsym", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara-doc", "binary_version": "3.7.1-1ubuntu2" } ] }