
Cloud Vulnerability DB
A community-led vulnerabilities database
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow vulnerability via _interceptorstrlen.part at /sanitizercommon/sanitizercommon_interceptors.inc. The vulnerability was identified and reported on July 11, 2022 (GitHub Issue).
The heap-buffer overflow occurs in the getString() function within SWF::Reader when processing SWF files. The vulnerability is triggered during the parsing of SWF files when converting them to XML format using the swf2xml command. The issue specifically manifests in the _interceptorstrlen.part.36 function, where a READ operation of size 1 occurs at an out-of-bounds memory address. The overflow happens 1 byte to the right of a 20466-byte allocated region (GitHub Issue).
When exploited, this vulnerability can lead to a program crash, resulting in a denial of service condition. The heap-buffer overflow could potentially allow for memory corruption, which might enable arbitrary code execution in certain circumstances (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."