Radare

Radare2

154 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.59%
  • Veröffentlicht 20.07.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:51

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 09.12.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:35:07

radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly ...

Exploit
  • EPSS 3.05%
  • Veröffentlicht 05.12.2019 02:15:19
  • Zuletzt bearbeitet 21.11.2024 04:35:00

In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary ma...

  • EPSS 1.34%
  • Veröffentlicht 23.09.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:03

In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is du...

Exploit
  • EPSS 7.08%
  • Veröffentlicht 07.08.2019 15:15:14
  • Zuletzt bearbeitet 21.11.2024 04:27:15

In radare2 before 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is du...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 17.06.2019 23:15:13
  • Zuletzt bearbeitet 21.11.2024 04:23:44

In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.

Exploit
  • EPSS 0.78%
  • Veröffentlicht 15.06.2019 17:29:10
  • Zuletzt bearbeitet 21.11.2024 04:23:40

radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affe...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 13.06.2019 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:23:36

In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 10.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:35

In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of mi...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 25.12.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:31

In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash via a stack-based buffer overflow) by crafting an input file, a related issue to CVE-2018-20456.