Page 11 of 75 results (0.018 seconds)

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 2

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. Una Desreferencia de puntero NULL en el repositorio GitHub radareorg/radare2 anterior a la versión 5.6.0. • http://www.openwall.com/lists/oss-security/2022/05/25/1 https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2 https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU • CWE-476: NULL Pointer Dereference •

CVSS: 9.6EPSS: 0%CPEs: 3EXPL: 1

radare2 is vulnerable to Out-of-bounds Read radare2 es vulnerable a una Lectura Fuera de Límites • https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 3

In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. En radare2 versiones hasta 5.3.0, se presenta una vulnerabilidad de doble liberación en el análisis de pyc mediante un archivo diseñado que puede conllevar a una denegación de servicio • https://bugzilla.redhat.com/show_bug.cgi?id=1959939 https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 https://github.com/radareorg/radare2/issues/18666 https://github.com/radareorg/radare2/issues/18667 https://github.com/radareorg/radare2/issues/18679 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3LPB5VGCIA7WA55FSB3YZQFUGZKWD7O https://lists.fedoraproject.org/archives/l • CWE-415: Double Free CWE-416: Use After Free •

CVSS: 9.6EPSS: 1%CPEs: 3EXPL: 0

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory. En radare2 versiones anteriores a 4.5.0, los nombres de archivo PDB malformado en la ruta del servidor PDB causa una inyección de shell. Para desencadenar el problema, se requiere abrir el ejecutable en radare2 y ejecutar idpd para desencadenar la descarga. • https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 https://github.com/radareorg/radare2/issues/16945 https://github.com/radareorg/radare2/pull/16966 https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. radare2 versiones hasta 4.0.0, carece de comprobación de la variable de contenido en la función r_asm_pseudo_incbin en el archivo libr/asm/asm.c, finalmente conllevando a una escritura arbitraria. Esto permite a atacantes remotos causar una denegación de servicio (bloqueo de aplicación) o posiblemente tener otro impacto no especificado por medio de una entrada diseñada. • https://github.com/radareorg/radare2/issues/15545 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRQXCOVFWZIIMAZIAAFAVQGZOS7LGHXP https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQTOWEDFXDTGTD6D4NHRB4FUURQSTTEN • CWE-476: NULL Pointer Dereference •