The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file.
{
"binaries": [
{
"binary_name": "libming-dev",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "libming-util",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "libming1",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "libswf-perl",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "ming-fonts-dejavu",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "ming-fonts-opensymbol",
"binary_version": "1:0.4.5-1.2ubuntu7"
},
{
"binary_name": "python-ming",
"binary_version": "1:0.4.5-1.2ubuntu7"
}
]
}