A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.295986 | vdb entry |
https://vuldb.com/?ctiid.295986 | permissions required signature |
https://vuldb.com/?submit.498499 | third party advisory |
https://github.com/radareorg/radare2/issues/23953 | issue tracking |
https://github.com/radareorg/radare2/issues/23953#issue-2844325926 | exploit issue tracking |
https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545 | patch |
https://github.com/radareorg/radare2/milestone/86 | patch |