Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35419: n/a

0
Medium
VulnerabilityCVE-2024-35419cvecve-2024-35419
Published: Fri Nov 08 2024 (11/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

wac commit 385e1 was discovered to contain a heap overflow via the load_module function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:54:41 UTC

Technical Analysis

CVE-2024-35419 is a heap overflow vulnerability identified in the load_module function within the wac component's wa.c source file, specifically at commit 385e1. The vulnerability arises from improper handling of input data when loading WebAssembly (wasm) modules, leading to a heap-based buffer overflow condition (CWE-120). An attacker can exploit this by crafting a malicious wasm file that, when processed by the vulnerable load_module function, causes memory corruption. This corruption results in a Denial of Service (DoS) by crashing the application or service that loads the wasm file. The CVSS 3.1 base score is 5.5 (medium severity), with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability affects systems that incorporate the wac component for wasm module loading, which is commonly used in environments that execute WebAssembly code for performance or sandboxing benefits. The heap overflow could be leveraged to disrupt service availability, potentially affecting applications relying on wasm modules for critical functionality.

Potential Impact

The primary impact of CVE-2024-35419 is Denial of Service, which can interrupt the availability of applications or services that process WebAssembly modules using the vulnerable wac component. This can lead to service downtime, degraded user experience, and potential operational disruptions, especially in environments where wasm is used for performance-critical or sandboxed execution. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, repeated exploitation could cause persistent outages or require emergency remediation efforts, increasing operational costs and reducing trust in affected systems. Organizations relying heavily on wasm for web applications, edge computing, or embedded systems may face increased risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate future risk, especially as attackers develop proof-of-concept exploits. The medium severity rating reflects the balance between the limited impact scope and the ease of triggering the vulnerability via crafted wasm files.

Mitigation Recommendations

1. Restrict and validate all WebAssembly files before loading, ensuring only trusted sources are allowed to execute wasm modules. 2. Implement runtime memory safety checks and bounds checking in the wasm loading and execution environment to detect and prevent heap overflows. 3. Employ sandboxing and process isolation techniques to contain potential crashes and limit the impact of DoS conditions. 4. Monitor application logs and system behavior for abnormal crashes or load_module failures indicative of exploitation attempts. 5. Apply any future patches or updates from the wac component maintainers promptly once available. 6. Consider using WebAssembly runtime environments with built-in security hardening and fuzz testing to identify similar vulnerabilities proactively. 7. Educate developers and system administrators about the risks of loading untrusted wasm files and enforce strict code review and deployment policies. 8. If possible, disable or limit wasm module loading functionality in environments where it is not essential. These steps go beyond generic advice by focusing on controlling wasm input sources, enhancing runtime safety, and operational monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c58b7ef31ef0b5632f2

Added to database: 2/25/2026, 9:40:40 PM

Last enriched: 2/26/2026, 4:54:41 AM

Last updated: 4/12/2026, 5:08:34 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses