Description
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule (involving hex strings) that is mishandled in the _yr_re_emit function, a different vulnerability than CVE-2017-9304.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: High
Affected Packages3 packages
🔴Vulnerability Details
4OSVyara vulnerabilities↗2026-03-09 ▶ GHSAGHSA-24f8-4r56-7793: libyara/re↗2022-05-13 ▶ CVEListCVE-2017-9438: libyara/re↗2017-06-05 ▶ OSVCVE-2017-9438: libyara/re↗2017-06-05 ▶ 📋Vendor Advisories
2UbuntuYARA vulnerabilities↗2026-03-09 ▶ DebianCVE-2017-9438: yara - libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause...↗2017 ▶ 💬Community
2BugzillaCVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function↗2017-06-06 ▶ BugzillaCVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function [epel-6]↗2017-06-06 ▶