CVE-2017-15368Out-of-bounds Read in Radare2

CWE-125Out-of-bounds Read7 documents4 sources
Severity
7.8HIGHNVD
NVD5.5
EPSS
0.2%
top 53.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 13

Description

The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

debiandebian/radare2< radare2 2.1.0+dfsg-1 (sid)+1
NVDradare/radare22.0.0, 2.5.0+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5g24-9pw5-67r7: In radare2 22022-05-13
GHSA
GHSA-xmc6-hhpj-cp6w: The wasm_dis function in libr/asm/arch/wasm/wasm2022-05-13
OSV
CVE-2018-10186: In radare2 22018-04-17

📋Vendor Advisories

2
Debian
CVE-2018-10186: radare2 - In radare2 2.5.0, there is a heap-based buffer over-read in the r_hex_bin2str fu...2018
Debian
CVE-2017-15368: radare2 - The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remot...2017