Vulnerability Name: | CVE-2022-1437 (CCN-225153) | ||||||||||||
Assigned: | 2022-04-20 | ||||||||||||
Published: | 2022-04-20 | ||||||||||||
Updated: | 2022-05-03 | ||||||||||||
Summary: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1437 Source: XF Type: UNKNOWN radare2-cve20221437-bo(225153) Source: CCN Type: radare2 GIT Repository Fix oobread and null deref in symbols file parser ##crash Source: MISC Type: Patch, Third Party Advisory https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136 Source: CONFIRM Type: Exploit, Third Party Advisory https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038 Source: CCN Type: huntr Web site Heap-based Buffer Overflow in radareorg/radare2 Source: CCN Type: Mend Vulnerability Database CVE-2022-1437 Source: CCN Type: radare2 Web site radare2 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |