<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2017-20228 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2017-20228/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 28 Mar 2026 12:16:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2017-20228/feed.xml" rel="self" type="application/rss+xml"/><item><title>Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)</title><link>https://feed.craftedsignal.io/briefs/2026-03-flat-assembler-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-flat-assembler-overflow/</guid><description>Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.</description><content:encoded>&lt;p>The Flat Assembler (FASM) version 1.71.21 is vulnerable to a stack-based buffer overflow (CVE-2017-20228). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack requires the attacker to supply a specially crafted assembly file as input to FASM. By providing an input file larger than 5895 bytes, the attacker can overwrite the instruction pointer, leading to arbitrary code execution. This is achieved through return-oriented programming (ROP)…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2017-20228</category><category>buffer-overflow</category><category>local-privilege-escalation</category></item></channel></rss>