CVE-2022-1451Access of Memory Location After End of Buffer in Radare2

Severity
7.1HIGHNVD
EPSS
0.3%
top 48.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 24
Latest updateApr 25

Description

Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

CVEListV5radareorg/radareorg_radare2unspecified5.7.0
NVDradare/radare2< 5.7.0
debiandebian/radare2< radare2 5.9.0+dfsg-1 (sid)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c72r-87h5-77h5: Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 52022-04-25
OSV
CVE-2022-1451: Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 52022-04-24

📋Vendor Advisories

1
Debian
CVE-2022-1451: radare2 - Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repo...2022