An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Link | Tags |
---|---|
https://github.com/radareorg/radare2/issues/16304 | issue tracking patch exploit third party advisory |
https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | third party advisory patch |