CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. | 5.5 |
Medium |
||
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. | 7.5 |
High |
||
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. | 9.8 |
Critical |
||
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. | 9.8 |
Critical |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. | 8.8 |
High |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. | 9.8 |
Critical |
||
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. | 7.5 |
High |
||
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2. | 7.8 |
High |
||
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. | 7.5 |
High |
||
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. | 7.8 |
High |
||
A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash. | 9.1 |
Critical |
||
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack. | 7.5 |
High |
||
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn). | 7.5 |
High |
||
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. | 9.1 |
Critical |
||
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. | 5.5 |
Medium |
||
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. | 7.8 |
High |
||
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | 7.1 |
High |
||
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). | 5.5 |
Medium |
||
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | 7.1 |
High |
||
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | 7.1 |
High |
||
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. | 5.5 |
Medium |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | 7.1 |
High |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | 6.1 |
Medium |
||
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system. | 5.5 |
Medium |
||
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. | 9.1 |
Critical |
||
Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. | 9.1 |
Critical |
||
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | 5.5 |
Medium |
||
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash). | 5.5 |
Medium |
||
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | 7.8 |
High |
||
Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | 7.8 |
High |
||
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | 7.8 |
High |
||
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | 5.5 |
Medium |
||
Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary. | 6.6 |
Medium |
||
Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6. | 5.5 |
Medium |
||
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. | 7.5 |
High |
||
Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6. | 7.8 |
High |
||
Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6. | 5.5 |
Medium |
||
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. | 7.5 |
High |
||
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. | 5.5 |
Medium |
||
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. | 5.5 |
Medium |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. | 7.1 |
High |
||
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4. | 5.5 |
Medium |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. | 7.8 |
High |
||
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. | 9.8 |
Critical |
||
Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2. | 7.1 |
High |
||
Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2. | 7.1 |
High |
||
Use After Free in NPM radare2.js prior to 5.6.2. | 7.8 |
High |
||
Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2. | 7.1 |
High |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. | 7.1 |
High |
||
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0. | 9.8 |
Critical |
||
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. | 7.8 |
High |
||
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. | 5.5 |
Medium |
||
radare2 is vulnerable to Out-of-bounds Read | 5.5 |
Medium |
||
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. | 5.5 |
Medium |
||
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory. | 9.6 |
Critical |
||
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. | 7.8 |
High |
||
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input. | 7.8 |
High |
||
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables. | 7.8 |
High |
||
In radare2 before 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling of symbol names embedded in executables. | 7.8 |
High |
||
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command. | 5.5 |
Medium |
||
radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affects libr/asm/asm.c and libr/parse/parse.c. | 7.5 |
High |
||
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg). | 7.8 |
High |
||
In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c. | 7.8 |
High |
||
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.c, a related issue to CVE-2018-20459. | 5.5 |
Medium |
||
In radare2 through 3.1.3, the armass_assemble function in libr/asm/arch/arm/armass.c allows attackers to cause a denial-of-service (application crash by out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.c, a related issue to CVE-2018-20457. | 5.5 |
Medium |