Vulnerability Name: | CVE-2022-1452 (CCN-225054) | ||||||||||||
Assigned: | 2022-04-23 | ||||||||||||
Published: | 2022-04-23 | ||||||||||||
Updated: | 2022-05-03 | ||||||||||||
Summary: | Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1452 Source: XF Type: UNKNOWN radare2-cve20221452-bo(225054) Source: CCN Type: radare2 GIT Repository Fix oobread in java parser ##crash Source: MISC Type: Patch, Third Party Advisory https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168 Source: CONFIRM Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6 Source: CCN Type: huntr Web site Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in radareorg/radare2 Source: CCN Type: Mend Vulnerability Database CVE-2022-1452 Source: CCN Type: radare2 Web site radare2 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |