Vulnerability Name: | CVE-2022-1451 (CCN-225055) | ||||||||||||
Assigned: | 2022-04-23 | ||||||||||||
Published: | 2022-04-23 | ||||||||||||
Updated: | 2022-05-03 | ||||||||||||
Summary: | Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1451 Source: XF Type: UNKNOWN radare2-cve20221451-bo(225055) Source: CCN Type: radare2 GIT Repository Fix oobread crash in java parser ##crash Source: MISC Type: Patch, Third Party Advisory https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529 Source: CONFIRM Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 Source: CCN Type: huntr Web site Out-of-bounds Read in r_bin_java_constant_value_attr_new function in radareorg/radare2 Source: CCN Type: Mend Vulnerability Database CVE-2022-1451 Source: CCN Type: radare2 Web site radare2 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |