Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input to the application. Attackers can craft malicious assembly input exceeding 5895 bytes to overwrite the instruction pointer and execute return-oriented programming chains for shell command execution.
References
| Link | Resource |
|---|---|
| http://www.flatassembler.net | Product |
| https://www.exploit-db.com/exploits/42265 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/flat-assembler-stack-based-buffer-overflow-rop | Third Party Advisory |
Configurations
History
02 Apr 2026, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:flatassembler:flat_assembler:*:*:*:*:*:*:*:* | |
| First Time |
Flatassembler
Flatassembler flat Assembler |
|
| References | () http://www.flatassembler.net - Product | |
| References | () https://www.exploit-db.com/exploits/42265 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/flat-assembler-stack-based-buffer-overflow-rop - Third Party Advisory |
28 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-28 12:16
Updated : 2026-04-02 19:20
NVD link : CVE-2017-20228
Mitre link : CVE-2017-20228
CVE.ORG link : CVE-2017-20228
JSON object : View
Products Affected
flatassembler
- flat_assembler
CWE
CWE-787
Out-of-bounds Write
