cpe:/a:advancemame:advancecomp:1.5 cpe:/a:advancemame:advancecomp:1.6 cpe:/a:advancemame:advancecomp:1.7 cpe:/a:advancemame:advancecomp:1.8 cpe:/a:advancemame:advancecomp:1.9 cpe:/a:advancemame:advancecomp:1.10 cpe:/a:advancemame:advancecomp:1.11 cpe:/a:advancemame:advancecomp:1.12 cpe:/a:advancemame:advancecomp:1.14 cpe:/a:advancemame:advancecomp:1.15 cpe:/a:advancemame:advancecomp:1.16 cpe:/a:advancemame:advancecomp:1.20 cpe:/a:advancemame:advancecomp:1.21 cpe:/a:advancemame:advancecomp:1.22 cpe:/a:advancemame:advancecomp:1.23 cpe:/a:advancemame:advancecomp:2.0 CVE-2019-8379 2019-02-16T21:29:00.410-05:00 2019-05-09T13:29:01.060-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov FEDORA FEDORA-2019-b30b48200c REDHAT RHSA-2019:2332 MISC https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/ MISC https://sourceforge.net/p/advancemame/bugs/271/ An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.