{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2017-20228/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2017-20228","buffer-overflow","local-privilege-escalation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe Flat Assembler (FASM) version 1.71.21 is vulnerable to a stack-based buffer overflow (CVE-2017-20228). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack requires the attacker to supply a specially crafted assembly file as input to FASM. By providing an input file larger than 5895 bytes, the attacker can overwrite the instruction pointer, leading to arbitrary code execution. This is achieved through return-oriented programming (ROP)…\u003c/p\u003e\n","date_modified":"2026-03-28T12:16:02Z","date_published":"2026-03-28T12:16:02Z","id":"/briefs/2026-03-flat-assembler-overflow/","summary":"Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.","title":"Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)","url":"https://feed.craftedsignal.io/briefs/2026-03-flat-assembler-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2017-20228","version":"https://jsonfeed.org/version/1.1"}