NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.
References
| Link | Resource |
|---|---|
| https://github.com/netwide-assembler/nasm/issues/217 | Exploit Issue Tracking |
Configurations
History
16 Apr 2026, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| References | () https://github.com/netwide-assembler/nasm/issues/217 - Exploit, Issue Tracking | |
| CPE | cpe:2.3:a:nasm:netwide_assembler:3.02:rc5:*:*:*:*:*:* | |
| First Time |
Nasm netwide Assembler
Nasm |
10 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
10 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 14:16
Updated : 2026-04-16 19:48
NVD link : CVE-2026-6069
Mitre link : CVE-2026-6069
CVE.ORG link : CVE-2026-6069
JSON object : View
Products Affected
nasm
- netwide_assembler
CWE
CWE-787
Out-of-bounds Write
