In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
| Software | From | Fixed in |
|---|---|---|
| virustotal / yara | 3.8.1 | 3.8.1.x |