cve_id
stringlengths 13
16
| obtain_all_privilege
stringclasses 3
values | obtain_user_privilege
stringclasses 2
values | obtain_other_privilege
stringclasses 2
values | user_interaction_required
stringclasses 3
values | cvss2_vector_string
stringclasses 106
values | cvss2_access_vector
stringclasses 4
values | cvss2_access_complexity
stringclasses 4
values | cvss2_authentication
stringclasses 3
values | cvss2_confidentiality_impact
stringclasses 4
values | cvss2_integrity_impact
stringclasses 4
values | cvss2_availability_impact
stringclasses 4
values | cvss2_base_score
stringclasses 50
values | cvss3_vector_string
stringclasses 226
values | cvss3_attack_vector
stringclasses 5
values | cvss3_attack_complexity
stringclasses 3
values | cvss3_privileges_required
stringclasses 4
values | cvss3_user_interaction
stringclasses 3
values | cvss3_scope
stringclasses 3
values | cvss3_confidentiality_impact
stringclasses 4
values | cvss3_integrity_impact
stringclasses 4
values | cvss3_availability_impact
stringclasses 4
values | cvss3_base_score
stringclasses 55
values | cvss3_base_severity
stringclasses 5
values | exploitability_score
stringclasses 22
values | impact_score
stringclasses 15
values | ac_insuf_info
stringclasses 3
values | reference_json
stringlengths 221
23.3k
| problemtype_json
stringclasses 200
values | severity
stringclasses 4
values | cve_nodes
stringlengths 2
33.1k
| cve_description
stringlengths 64
1.99k
| cve_last_modified_date
stringlengths 17
17
| cve_published_date
stringlengths 17
17
| cwe_name
stringclasses 125
values | cwe_description
stringclasses 124
values | cwe_extended_description
stringclasses 95
values | cwe_url
stringclasses 124
values | cwe_is_category
int64 0
1
| commit_author
stringlengths 0
34
| commit_author_date
stringlengths 25
25
| commit_msg
stringlengths 0
13.3k
| commit_hash
stringlengths 40
40
| commit_is_merge
stringclasses 1
value | repo_name
stringclasses 467
values | repo_description
stringclasses 459
values | repo_date_created
stringclasses 467
values | repo_date_last_push
stringclasses 467
values | repo_homepage
stringclasses 294
values | repo_owner
stringclasses 470
values | repo_stars
stringclasses 406
values | repo_forks
stringclasses 352
values | function_name
stringlengths 3
120
| function_signature
stringlengths 6
640
| function_parameters
stringlengths 2
302
| function
stringlengths 12
114k
| function_token_count
stringlengths 1
5
| function_before_change
stringclasses 1
value | labels
int64 1
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-15121 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 9.6 | CRITICAL | 2.8 | 6.0 | False | [{'url': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'name': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'name': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/16945', 'name': 'https://github.com/radareorg/radare2/issues/16945', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/pull/16966', 'name': 'https://github.com/radareorg/radare2/pull/16966', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/', 'name': 'FEDORA-2020-d5b33b6e6c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/', 'name': 'FEDORA-2020-aa51efe207', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-78'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '4.5.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory."}] | 2022-01-04T16:33Z | 2020-07-20T18:15Z | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage.
There are at least two subtypes of OS command injection:
The application intends to execute a single, fixed program that is under its own control. It intends to use externally-supplied inputs as arguments to that program. For example, the program might use system("nslookup [HOSTNAME]") to run nslookup and allow the user to supply a HOSTNAME, which is used as an argument. Attackers cannot prevent nslookup from executing. However, if the program does not remove command separators from the HOSTNAME argument, attackers could place the separators into the arguments, which allows them to execute their own program after nslookup has finished executing.
The application accepts an input that it uses to fully select which program to run, as well as which commands to use. The application simply redirects this entire command to the operating system. For example, the program might use "exec([COMMAND])" to execute the [COMMAND] that was supplied by the user. If the COMMAND is under attacker control, then the attacker can execute arbitrary commands or programs. If the command is being executed using functions like exec() and CreateProcess(), the attacker might not be able to combine multiple commands together in the same line.
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.
| https://cwe.mitre.org/data/definitions/78.html | 0 | GustavoLCR | 2020-06-10 13:00:00-03:00 | Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_socket_http_get | r_socket_http_get( const char * url , int * code , int * rlen) | ['url', 'code', 'rlen'] | R_API char *r_socket_http_get(const char *url, int *code, int *rlen) {
char *curl_env = r_sys_getenv ("R2_CURL");
if (curl_env && *curl_env) {
char *encoded_url = r_str_escape (url);
char *res = r_sys_cmd_strf ("curl '%s'", encoded_url);
free (encoded_url);
if (res) {
if (code) {
*code = 200;
}
if (rlen) {
*rlen = strlen (res);
}
}
free (curl_env);
return res;
}
free (curl_env);
RSocket *s;
int ssl = r_str_startswith (url, "https://");
char *response, *host, *path, *port = "80";
char *uri = strdup (url);
if (!uri) {
return NULL;
}
if (code) {
*code = 0;
}
if (rlen) {
*rlen = 0;
}
host = strstr (uri, "://");
if (!host) {
free (uri);
eprintf ("r_socket_http_get: Invalid URI");
return NULL;
}
host += 3;
port = strchr (host, ':');
if (!port) {
port = ssl? "443": "80";
path = host;
} else {
*port++ = 0;
path = port;
}
path = strchr (path, '/');
if (!path) {
path = "";
} else {
*path++ = 0;
}
s = r_socket_new (ssl);
if (!s) {
eprintf ("r_socket_http_get: Cannot create socket\n");
free (uri);
return NULL;
}
if (r_socket_connect_tcp (s, host, port, 0)) {
r_socket_printf (s,
"GET /%s HTTP/1.1\r\n"
"User-Agent: radare2 "R2_VERSION"\r\n"
"Accept: */*\r\n"
"Host: %s:%s\r\n"
"\r\n", path, host, port);
response = r_socket_http_answer (s, code, rlen);
} else {
eprintf ("Cannot connect to %s:%s\n", host, port);
response = NULL;
}
free (uri);
r_socket_free (s);
return response;
} | 378 | True | 1 |
CVE-2020-15121 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 9.6 | CRITICAL | 2.8 | 6.0 | False | [{'url': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'name': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'name': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/16945', 'name': 'https://github.com/radareorg/radare2/issues/16945', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/pull/16966', 'name': 'https://github.com/radareorg/radare2/pull/16966', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/', 'name': 'FEDORA-2020-d5b33b6e6c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/', 'name': 'FEDORA-2020-aa51efe207', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-78'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '4.5.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory."}] | 2022-01-04T16:33Z | 2020-07-20T18:15Z | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage.
There are at least two subtypes of OS command injection:
The application intends to execute a single, fixed program that is under its own control. It intends to use externally-supplied inputs as arguments to that program. For example, the program might use system("nslookup [HOSTNAME]") to run nslookup and allow the user to supply a HOSTNAME, which is used as an argument. Attackers cannot prevent nslookup from executing. However, if the program does not remove command separators from the HOSTNAME argument, attackers could place the separators into the arguments, which allows them to execute their own program after nslookup has finished executing.
The application accepts an input that it uses to fully select which program to run, as well as which commands to use. The application simply redirects this entire command to the operating system. For example, the program might use "exec([COMMAND])" to execute the [COMMAND] that was supplied by the user. If the COMMAND is under attacker control, then the attacker can execute arbitrary commands or programs. If the command is being executed using functions like exec() and CreateProcess(), the attacker might not be able to combine multiple commands together in the same line.
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.
| https://cwe.mitre.org/data/definitions/78.html | 0 | GustavoLCR | 2020-06-10 13:00:00-03:00 | Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_socket_http_post | r_socket_http_post( const char * url , const char * data , int * code , int * rlen) | ['url', 'data', 'code', 'rlen'] | R_API char *r_socket_http_post (const char *url, const char *data, int *code, int *rlen) {
RSocket *s;
bool ssl = r_str_startswith (url, "https://");
char *uri = strdup (url);
if (!uri) {
return NULL;
}
char *host = strstr (uri, "://");
if (!host) {
free (uri);
printf ("Invalid URI");
return NULL;
}
host += 3;
char *port = strchr (host, ':');
if (!port) {
port = (ssl)? "443": "80";
} else {
*port++ = 0;
}
char *path = strchr (host, '/');
if (!path) {
path = "";
} else {
*path++ = 0;
}
s = r_socket_new (ssl);
if (!s) {
printf ("Cannot create socket\n");
free (uri);
return NULL;
}
if (!r_socket_connect_tcp (s, host, port, 0)) {
eprintf ("Cannot connect to %s:%s\n", host, port);
free (uri);
return NULL;
}
/* Send */
r_socket_printf (s,
"POST /%s HTTP/1.0\r\n"
"User-Agent: radare2 "R2_VERSION"\r\n"
"Accept: */*\r\n"
"Host: %s\r\n"
"Content-Length: %i\r\n"
"Content-Type: application/x-www-form-urlencoded\r\n"
"\r\n", path, host, (int)strlen (data));
free (uri);
r_socket_write (s, (void *)data, strlen (data));
return r_socket_http_answer (s, code, rlen);
} | 276 | True | 1 |
CVE-2020-15121 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 9.6 | CRITICAL | 2.8 | 6.0 | False | [{'url': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'name': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'name': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/16945', 'name': 'https://github.com/radareorg/radare2/issues/16945', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/pull/16966', 'name': 'https://github.com/radareorg/radare2/pull/16966', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/', 'name': 'FEDORA-2020-d5b33b6e6c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/', 'name': 'FEDORA-2020-aa51efe207', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-78'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '4.5.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory."}] | 2022-01-04T16:33Z | 2020-07-20T18:15Z | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage.
There are at least two subtypes of OS command injection:
The application intends to execute a single, fixed program that is under its own control. It intends to use externally-supplied inputs as arguments to that program. For example, the program might use system("nslookup [HOSTNAME]") to run nslookup and allow the user to supply a HOSTNAME, which is used as an argument. Attackers cannot prevent nslookup from executing. However, if the program does not remove command separators from the HOSTNAME argument, attackers could place the separators into the arguments, which allows them to execute their own program after nslookup has finished executing.
The application accepts an input that it uses to fully select which program to run, as well as which commands to use. The application simply redirects this entire command to the operating system. For example, the program might use "exec([COMMAND])" to execute the [COMMAND] that was supplied by the user. If the COMMAND is under attacker control, then the attacker can execute arbitrary commands or programs. If the command is being executed using functions like exec() and CreateProcess(), the attacker might not be able to combine multiple commands together in the same line.
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.
| https://cwe.mitre.org/data/definitions/78.html | 0 | GustavoLCR | 2020-06-10 13:00:00-03:00 | Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_sys_cmd_str_full | r_sys_cmd_str_full( const char * cmd , const char * input , char ** output , int * len , char ** sterr) | ['cmd', 'input', 'output', 'len', 'sterr'] | R_API int r_sys_cmd_str_full(const char *cmd, const char *input, char **output, int *len, char **sterr) {
char *mysterr = NULL;
if (!sterr) {
sterr = &mysterr;
}
char buffer[1024], *outputptr = NULL;
char *inputptr = (char *)input;
int pid, bytes = 0, status;
int sh_in[2], sh_out[2], sh_err[2];
if (len) {
*len = 0;
}
if (pipe (sh_in)) {
return false;
}
if (output) {
if (pipe (sh_out)) {
close (sh_in[0]);
close (sh_in[1]);
close (sh_out[0]);
close (sh_out[1]);
return false;
}
}
if (pipe (sh_err)) {
close (sh_in[0]);
close (sh_in[1]);
return false;
}
switch ((pid = r_sys_fork ())) {
case -1:
return false;
case 0:
dup2 (sh_in[0], 0);
close (sh_in[0]);
close (sh_in[1]);
if (output) {
dup2 (sh_out[1], 1);
close (sh_out[0]);
close (sh_out[1]);
}
if (sterr) {
dup2 (sh_err[1], 2);
} else {
close (2);
}
close (sh_err[0]);
close (sh_err[1]);
exit (r_sandbox_system (cmd, 0));
default:
outputptr = strdup ("");
if (!outputptr) {
return false;
}
if (sterr) {
*sterr = strdup ("");
if (!*sterr) {
free (outputptr);
return false;
}
}
if (output) {
close (sh_out[1]);
}
close (sh_err[1]);
close (sh_in[0]);
if (!inputptr || !*inputptr) {
close (sh_in[1]);
}
// we should handle broken pipes somehow better
r_sys_signal (SIGPIPE, SIG_IGN);
for (;;) {
fd_set rfds, wfds;
int nfd;
FD_ZERO (&rfds);
FD_ZERO (&wfds);
if (output) {
FD_SET (sh_out[0], &rfds);
}
if (sterr) {
FD_SET (sh_err[0], &rfds);
}
if (inputptr && *inputptr) {
FD_SET (sh_in[1], &wfds);
}
memset (buffer, 0, sizeof (buffer));
nfd = select (sh_err[0] + 1, &rfds, &wfds, NULL, NULL);
if (nfd < 0) {
break;
}
if (output && FD_ISSET (sh_out[0], &rfds)) {
if (!(bytes = read (sh_out[0], buffer, sizeof (buffer)-1))) {
break;
}
buffer[sizeof (buffer) - 1] = '\0';
if (len) {
*len += bytes;
}
outputptr = r_str_append (outputptr, buffer);
} else if (FD_ISSET (sh_err[0], &rfds) && sterr) {
if (!read (sh_err[0], buffer, sizeof (buffer)-1)) {
break;
}
buffer[sizeof (buffer) - 1] = '\0';
*sterr = r_str_append (*sterr, buffer);
} else if (FD_ISSET (sh_in[1], &wfds) && inputptr && *inputptr) {
int inputptr_len = strlen (inputptr);
bytes = write (sh_in[1], inputptr, inputptr_len);
if (bytes != inputptr_len) {
break;
}
inputptr += bytes;
if (!*inputptr) {
close (sh_in[1]);
/* If neither stdout nor stderr should be captured,
* abort now - nothing more to do for select(). */
if (!output && !sterr) {
break;
}
}
}
}
if (output) {
close (sh_out[0]);
}
close (sh_err[0]);
close (sh_in[1]);
waitpid (pid, &status, 0);
bool ret = true;
if (status) {
// char *escmd = r_str_escape (cmd);
// eprintf ("error code %d (%s): %s\n", WEXITSTATUS (status), escmd, *sterr);
// eprintf ("(%s)\n", output);
// eprintf ("%s: failed command '%s'\n", __func__, escmd);
// free (escmd);
ret = false;
}
if (output) {
*output = outputptr;
} else {
free (outputptr);
}
return ret;
}
return false;
} | 858 | True | 1 |
CVE-2020-15121 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 9.6 | CRITICAL | 2.8 | 6.0 | False | [{'url': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'name': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'name': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/16945', 'name': 'https://github.com/radareorg/radare2/issues/16945', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/pull/16966', 'name': 'https://github.com/radareorg/radare2/pull/16966', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/', 'name': 'FEDORA-2020-d5b33b6e6c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/', 'name': 'FEDORA-2020-aa51efe207', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-78'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '4.5.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory."}] | 2022-01-04T16:33Z | 2020-07-20T18:15Z | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage.
There are at least two subtypes of OS command injection:
The application intends to execute a single, fixed program that is under its own control. It intends to use externally-supplied inputs as arguments to that program. For example, the program might use system("nslookup [HOSTNAME]") to run nslookup and allow the user to supply a HOSTNAME, which is used as an argument. Attackers cannot prevent nslookup from executing. However, if the program does not remove command separators from the HOSTNAME argument, attackers could place the separators into the arguments, which allows them to execute their own program after nslookup has finished executing.
The application accepts an input that it uses to fully select which program to run, as well as which commands to use. The application simply redirects this entire command to the operating system. For example, the program might use "exec([COMMAND])" to execute the [COMMAND] that was supplied by the user. If the COMMAND is under attacker control, then the attacker can execute arbitrary commands or programs. If the command is being executed using functions like exec() and CreateProcess(), the attacker might not be able to combine multiple commands together in the same line.
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.
| https://cwe.mitre.org/data/definitions/78.html | 0 | GustavoLCR | 2020-06-10 13:00:00-03:00 | Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_sys_mkdirp | r_sys_mkdirp( const char * dir) | ['dir'] | R_API bool r_sys_mkdirp(const char *dir) {
bool ret = true;
char slash = R_SYS_DIR[0];
char *path = strdup (dir), *ptr = path;
if (!path) {
eprintf ("r_sys_mkdirp: Unable to allocate memory\n");
return false;
}
if (*ptr == slash) {
ptr++;
}
#if __WINDOWS__
{
char *p = strstr (ptr, ":\\");
if (p) {
ptr = p + 2;
}
}
#endif
for (;;) {
// find next slash
for (; *ptr; ptr++) {
if (*ptr == '/' || *ptr == '\\') {
slash = *ptr;
break;
}
}
if (!*ptr) {
break;
}
*ptr = 0;
if (!r_sys_mkdir (path) && r_sys_mkdir_failed ()) {
eprintf ("r_sys_mkdirp: fail '%s' of '%s'\n", path, dir);
free (path);
return false;
}
*ptr = slash;
ptr++;
}
if (!r_sys_mkdir (path) && r_sys_mkdir_failed ()) {
ret = false;
}
free (path);
return ret;
} | 207 | True | 1 |
CVE-2020-15121 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | CHANGED | HIGH | HIGH | HIGH | 9.6 | CRITICAL | 2.8 | 6.0 | False | [{'url': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'name': 'https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'name': 'https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/16945', 'name': 'https://github.com/radareorg/radare2/issues/16945', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/pull/16966', 'name': 'https://github.com/radareorg/radare2/pull/16966', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/', 'name': 'FEDORA-2020-d5b33b6e6c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/', 'name': 'FEDORA-2020-aa51efe207', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-78'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '4.5.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory."}] | 2022-01-04T16:33Z | 2020-07-20T18:15Z | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage.
There are at least two subtypes of OS command injection:
The application intends to execute a single, fixed program that is under its own control. It intends to use externally-supplied inputs as arguments to that program. For example, the program might use system("nslookup [HOSTNAME]") to run nslookup and allow the user to supply a HOSTNAME, which is used as an argument. Attackers cannot prevent nslookup from executing. However, if the program does not remove command separators from the HOSTNAME argument, attackers could place the separators into the arguments, which allows them to execute their own program after nslookup has finished executing.
The application accepts an input that it uses to fully select which program to run, as well as which commands to use. The application simply redirects this entire command to the operating system. For example, the program might use "exec([COMMAND])" to execute the [COMMAND] that was supplied by the user. If the COMMAND is under attacker control, then the attacker can execute arbitrary commands or programs. If the command is being executed using functions like exec() and CreateProcess(), the attacker might not be able to combine multiple commands together in the same line.
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.
| https://cwe.mitre.org/data/definitions/78.html | 0 | GustavoLCR | 2020-06-10 13:00:00-03:00 | Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_sys_mkdirp | r_sys_mkdirp( char * dir) | ['dir'] | static inline int r_sys_mkdirp(char *dir) {
int ret = 1;
const char slash = DIRSEP;
char *path = dir;
char *ptr = path;
if (*ptr == slash) {
ptr++;
}
#if __SDB_WINDOWS__
char *p = strstr (ptr, ":\\");
if (p) {
ptr = p + 2;
}
#endif
while ((ptr = strchr (ptr, slash))) {
*ptr = 0;
if (!r_sys_mkdir (path) && r_sys_mkdir_failed ()) {
eprintf ("r_sys_mkdirp: fail '%s' of '%s'\n", path, dir);
*ptr = slash;
return 0;
}
*ptr = slash;
ptr++;
}
return ret;
} | 128 | True | 1 |
CVE-2021-32613 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/issues/18679', 'name': 'https://github.com/radareorg/radare2/issues/18679', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'refsource': 'MISC', 'tags': ['Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W3LPB5VGCIA7WA55FSB3YZQFUGZKWD7O/', 'name': 'FEDORA-2021-ca59eb65a9', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Y3S7JB46PONPHXZHIMR2XDPLGJCN5ZIX/', 'name': 'FEDORA-2021-834f900f53', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'name': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18666', 'name': 'https://github.com/radareorg/radare2/issues/18666', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18667', 'name': 'https://github.com/radareorg/radare2/issues/18667', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'name': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-415'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndIncluding': '5.3.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.'}] | 2022-04-25T20:03Z | 2021-05-14T13:15Z | Double Free | The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. | When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program later gives the attacker control over the data that is written into this doubly-allocated memory, the program becomes vulnerable to a buffer overflow attack.
| https://cwe.mitre.org/data/definitions/415.html | 0 | pancake | 2021-05-07 18:44:49+02:00 | Fix #18667 - division by zero in the macho parser ##bin | a07dedb804a82bc01c07072861942dd80c6b6d62 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | rebase_buffer | rebase_buffer( struct MACH0_(obj_t) * obj , ut64 off , RIODesc * fd , ut8 * buf , int count) | ['obj', 'off', 'fd', 'buf', 'count'] | static void rebase_buffer(struct MACH0_(obj_t) *obj, ut64 off, RIODesc *fd, ut8 *buf, int count) {
if (obj->rebasing_buffer) {
return;
}
obj->rebasing_buffer = true;
ut64 eob = off + count;
int i = 0;
for (; i < obj->nsegs; i++) {
if (!obj->chained_starts[i]) {
continue;
}
ut64 page_size = obj->chained_starts[i]->page_size;
ut64 start = obj->segs[i].fileoff;
ut64 end = start + obj->segs[i].filesize;
if (end >= off && start <= eob) {
ut64 page_idx = (R_MAX (start, off) - start) / page_size;
ut64 page_end_idx = (R_MIN (eob, end) - start) / page_size;
for (; page_idx <= page_end_idx; page_idx++) {
if (page_idx >= obj->chained_starts[i]->page_count) {
break;
}
ut16 page_start = obj->chained_starts[i]->page_start[page_idx];
if (page_start == DYLD_CHAINED_PTR_START_NONE) {
continue;
}
ut64 cursor = start + page_idx * page_size + page_start;
while (cursor < eob && cursor < end) {
ut8 tmp[8];
if (r_buf_read_at (obj->b, cursor, tmp, 8) != 8) {
break;
}
ut64 raw_ptr = r_read_le64 (tmp);
bool is_auth = IS_PTR_AUTH (raw_ptr);
bool is_bind = IS_PTR_BIND (raw_ptr);
ut64 ptr_value = raw_ptr;
ut64 delta;
if (is_auth && is_bind) {
struct dyld_chained_ptr_arm64e_auth_bind *p =
(struct dyld_chained_ptr_arm64e_auth_bind *) &raw_ptr;
delta = p->next;
} else if (!is_auth && is_bind) {
struct dyld_chained_ptr_arm64e_bind *p =
(struct dyld_chained_ptr_arm64e_bind *) &raw_ptr;
delta = p->next;
} else if (is_auth && !is_bind) {
struct dyld_chained_ptr_arm64e_auth_rebase *p =
(struct dyld_chained_ptr_arm64e_auth_rebase *) &raw_ptr;
delta = p->next;
ptr_value = p->target + obj->baddr;
} else {
struct dyld_chained_ptr_arm64e_rebase *p =
(struct dyld_chained_ptr_arm64e_rebase *) &raw_ptr;
delta = p->next;
ptr_value = ((ut64)p->high8 << 56) | p->target;
}
ut64 in_buf = cursor - off;
if (cursor >= off && cursor <= eob - 8) {
r_write_le64 (&buf[in_buf], ptr_value);
}
cursor += delta * 8;
if (!delta) {
break;
}
}
}
}
}
obj->rebasing_buffer = false;
} | 488 | True | 1 |
CVE-2021-32613 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/issues/18679', 'name': 'https://github.com/radareorg/radare2/issues/18679', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'refsource': 'MISC', 'tags': ['Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W3LPB5VGCIA7WA55FSB3YZQFUGZKWD7O/', 'name': 'FEDORA-2021-ca59eb65a9', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Y3S7JB46PONPHXZHIMR2XDPLGJCN5ZIX/', 'name': 'FEDORA-2021-834f900f53', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'name': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18666', 'name': 'https://github.com/radareorg/radare2/issues/18666', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18667', 'name': 'https://github.com/radareorg/radare2/issues/18667', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'name': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-415'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndIncluding': '5.3.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.'}] | 2022-04-25T20:03Z | 2021-05-14T13:15Z | Double Free | The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. | When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program later gives the attacker control over the data that is written into this doubly-allocated memory, the program becomes vulnerable to a buffer overflow attack.
| https://cwe.mitre.org/data/definitions/415.html | 0 | pancake | 2021-05-07 21:09:59+02:00 | Fix #18666 - uaf in python bin parser | 5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_none_object | get_none_object( void) | ['void'] | static pyc_object *get_none_object(void) {
pyc_object *ret;
ret = R_NEW0 (pyc_object);
if (!ret) {
return NULL;
}
ret->type = TYPE_NONE;
ret->data = strdup ("None");
if (!ret->data) {
R_FREE (ret);
}
return ret;
} | 59 | True | 1 |
CVE-2021-32613 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/issues/18679', 'name': 'https://github.com/radareorg/radare2/issues/18679', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1959939', 'refsource': 'MISC', 'tags': ['Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W3LPB5VGCIA7WA55FSB3YZQFUGZKWD7O/', 'name': 'FEDORA-2021-ca59eb65a9', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Y3S7JB46PONPHXZHIMR2XDPLGJCN5ZIX/', 'name': 'FEDORA-2021-834f900f53', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'name': 'https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18666', 'name': 'https://github.com/radareorg/radare2/issues/18666', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/issues/18667', 'name': 'https://github.com/radareorg/radare2/issues/18667', 'refsource': 'MISC', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'name': 'https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-415'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndIncluding': '5.3.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.'}] | 2022-04-25T20:03Z | 2021-05-14T13:15Z | Double Free | The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. | When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program later gives the attacker control over the data that is written into this doubly-allocated memory, the program becomes vulnerable to a buffer overflow attack.
| https://cwe.mitre.org/data/definitions/415.html | 0 | pancake | 2021-05-07 21:09:59+02:00 | Fix #18666 - uaf in python bin parser | 5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_object | get_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_object(RBuffer *buffer) {
bool error = false;
pyc_object *ret = NULL;
ut8 code = get_ut8 (buffer, &error);
ut8 flag = code & FLAG_REF;
RListIter *ref_idx = NULL;
ut8 type = code & ~FLAG_REF;
if (error) {
return NULL;
}
if (flag) {
ret = get_none_object ();
if (!ret) {
return NULL;
}
ref_idx = r_list_append (refs, ret);
if (!ref_idx) {
free_object (ret);
return NULL;
}
}
switch (type) {
case TYPE_NULL:
free_object (ret);
return NULL;
case TYPE_TRUE:
free_object (ret);
return get_true_object ();
case TYPE_FALSE:
free_object (ret);
return get_false_object ();
case TYPE_NONE:
free_object (ret);
return get_none_object ();
case TYPE_REF:
free_object (ret);
return get_ref_object (buffer);
case TYPE_SMALL_TUPLE:
ret = get_small_tuple_object (buffer);
break;
case TYPE_TUPLE:
ret = get_tuple_object (buffer);
break;
case TYPE_STRING:
ret = get_string_object (buffer);
break;
case TYPE_CODE_v0:
ret = get_code_object (buffer);
if (ret) {
ret->type = TYPE_CODE_v0;
}
break;
case TYPE_CODE_v1:
ret = get_code_object (buffer);
if (ret) {
ret->type = TYPE_CODE_v1;
}
break;
case TYPE_INT:
ret = get_int_object (buffer);
break;
case TYPE_ASCII_INTERNED:
ret = get_ascii_interned_object (buffer);
break;
case TYPE_SHORT_ASCII:
ret = get_short_ascii_object (buffer);
break;
case TYPE_ASCII:
ret = get_ascii_object (buffer);
break;
case TYPE_SHORT_ASCII_INTERNED:
ret = get_short_ascii_interned_object (buffer);
break;
case TYPE_INT64:
ret = get_int64_object (buffer);
break;
case TYPE_INTERNED:
ret = get_interned_object (buffer);
break;
case TYPE_STRINGREF:
ret = get_stringref_object (buffer);
break;
case TYPE_FLOAT:
ret = get_float_object (buffer);
break;
case TYPE_BINARY_FLOAT:
ret = get_binary_float_object (buffer);
break;
case TYPE_COMPLEX:
ret = get_complex_object (buffer); // behaviour depends on Python version
break;
case TYPE_BINARY_COMPLEX:
ret = get_binary_complex_object (buffer);
break;
case TYPE_LIST:
ret = get_list_object (buffer);
break;
case TYPE_LONG:
ret = get_long_object (buffer);
break;
case TYPE_UNICODE:
ret = get_unicode_object (buffer);
break;
case TYPE_DICT:
ret = get_dict_object (buffer);
break;
case TYPE_FROZENSET:
case TYPE_SET:
ret = get_set_object (buffer);
break;
case TYPE_STOPITER:
case TYPE_ELLIPSIS:
ret = R_NEW0 (pyc_object);
break;
case TYPE_UNKNOWN:
eprintf ("Get not implemented for type 0x%x\n", type);
free_object (ret);
return NULL;
case 0:
// nop
break;
default:
eprintf ("Undefined type in get_object (0x%x)\n", type);
free_object (ret);
return NULL;
}
if (flag && ref_idx) {
free_object (ref_idx->data);
ref_idx->data = copy_object (ret);
}
return ret;
} | 548 | True | 1 |
CVE-2022-0139 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c', 'name': 'https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0', 'name': 'https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.0', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.'}] | 2022-02-11T16:55Z | 2022-02-08T19:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Sergi Àlvarez i Capilla | 2022-01-06 19:33:28+01:00 | Fix use-after-free in iobank rbtree usage ##io
* See havoc4 bin for reproducer
* Reported via huntr.dev by 'Cen Zhang' | 37897226a1a31f982bfefdc4aeefc2e50355c73c | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_io_bank_map_add_top | r_io_bank_map_add_top( RIO * io , const ut32 bankid , const ut32 mapid) | ['io', 'bankid', 'mapid'] | R_API bool r_io_bank_map_add_top(RIO *io, const ut32 bankid, const ut32 mapid) {
RIOBank *bank = r_io_bank_get (io, bankid);
RIOMap *map = r_io_map_get (io, mapid);
r_return_val_if_fail (io && bank && map, false);
RIOMapRef *mapref = _mapref_from_map (map);
if (!mapref) {
return false;
}
RIOSubMap *sm = r_io_submap_new (io, mapref);
if (!sm) {
free (mapref);
return false;
}
RRBNode *entry = _find_entry_submap_node (bank, sm);
if (!entry) {
// no intersection with any submap, so just insert
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
bank->last_used = NULL;
RIOSubMap *bd = (RIOSubMap *)entry->data;
if (r_io_submap_to (bd) == r_io_submap_to (sm) &&
r_io_submap_from (bd) >= r_io_submap_from (sm)) {
// _find_entry_submap_node guarantees, that there is no submap
// prior to bd in the range of sm, so instead of deleting and inserting
// we can just memcpy
memcpy (bd, sm, sizeof (RIOSubMap));
free (sm);
r_list_append (bank->maprefs, mapref);
return true;
}
if (r_io_submap_from (bd) < r_io_submap_from (sm) &&
r_io_submap_to (sm) < r_io_submap_to (bd)) {
// split bd into 2 maps => bd and bdsm
RIOSubMap *bdsm = R_NEWCOPY (RIOSubMap, bd);
if (!bdsm) {
free (sm);
free (mapref);
return false;
}
r_io_submap_set_from (bdsm, r_io_submap_to (sm) + 1);
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
// TODO: insert and check return value, before adjusting sm size
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (bdsm);
free (mapref);
return false;
}
if (!r_crbtree_insert (bank->submaps, bdsm, _find_sm_by_from_vaddr_cb, NULL)) {
r_crbtree_delete (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL);
free (sm);
free (bdsm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
// guaranteed intersection
if (r_io_submap_from (bd) < r_io_submap_from (sm)) {
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
entry = r_rbnode_next (entry);
}
while (entry && r_io_submap_to (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
//delete all submaps that are completly included in sm
RRBNode *next = r_rbnode_next (entry);
// this can be optimized, there is no need to do search here
r_crbtree_delete (bank->submaps, entry->data, _find_sm_by_from_vaddr_cb, NULL);
entry = next;
}
if (entry && r_io_submap_from (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
bd = (RIOSubMap *)entry->data;
r_io_submap_set_from (bd, r_io_submap_to (sm) + 1);
}
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
} | 576 | True | 1 |
CVE-2022-0173 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5', 'name': 'https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c', 'name': 'https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/', 'name': 'FEDORA-2022-ba3248e596', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/', 'name': 'FEDORA-2022-3fc85cd09c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}, {'lang': 'en', 'value': 'CWE-125'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'radare2 is vulnerable to Out-of-bounds Read'}] | 2022-03-01T19:53Z | 2022-01-11T17:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | Sergi Àlvarez i Capilla | 2022-01-06 19:33:28+01:00 | Fix use-after-free in iobank rbtree usage ##io
* See havoc4 bin for reproducer
* Reported via huntr.dev by 'Cen Zhang' | 37897226a1a31f982bfefdc4aeefc2e50355c73c | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_io_bank_map_add_top | r_io_bank_map_add_top( RIO * io , const ut32 bankid , const ut32 mapid) | ['io', 'bankid', 'mapid'] | R_API bool r_io_bank_map_add_top(RIO *io, const ut32 bankid, const ut32 mapid) {
RIOBank *bank = r_io_bank_get (io, bankid);
RIOMap *map = r_io_map_get (io, mapid);
r_return_val_if_fail (io && bank && map, false);
RIOMapRef *mapref = _mapref_from_map (map);
if (!mapref) {
return false;
}
RIOSubMap *sm = r_io_submap_new (io, mapref);
if (!sm) {
free (mapref);
return false;
}
RRBNode *entry = _find_entry_submap_node (bank, sm);
if (!entry) {
// no intersection with any submap, so just insert
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
bank->last_used = NULL;
RIOSubMap *bd = (RIOSubMap *)entry->data;
if (r_io_submap_to (bd) == r_io_submap_to (sm) &&
r_io_submap_from (bd) >= r_io_submap_from (sm)) {
// _find_entry_submap_node guarantees, that there is no submap
// prior to bd in the range of sm, so instead of deleting and inserting
// we can just memcpy
memcpy (bd, sm, sizeof (RIOSubMap));
free (sm);
r_list_append (bank->maprefs, mapref);
return true;
}
if (r_io_submap_from (bd) < r_io_submap_from (sm) &&
r_io_submap_to (sm) < r_io_submap_to (bd)) {
// split bd into 2 maps => bd and bdsm
RIOSubMap *bdsm = R_NEWCOPY (RIOSubMap, bd);
if (!bdsm) {
free (sm);
free (mapref);
return false;
}
r_io_submap_set_from (bdsm, r_io_submap_to (sm) + 1);
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
// TODO: insert and check return value, before adjusting sm size
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (bdsm);
free (mapref);
return false;
}
if (!r_crbtree_insert (bank->submaps, bdsm, _find_sm_by_from_vaddr_cb, NULL)) {
r_crbtree_delete (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL);
free (sm);
free (bdsm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
// guaranteed intersection
if (r_io_submap_from (bd) < r_io_submap_from (sm)) {
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
entry = r_rbnode_next (entry);
}
while (entry && r_io_submap_to (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
//delete all submaps that are completly included in sm
RRBNode *next = r_rbnode_next (entry);
// this can be optimized, there is no need to do search here
r_crbtree_delete (bank->submaps, entry->data, _find_sm_by_from_vaddr_cb, NULL);
entry = next;
}
if (entry && r_io_submap_from (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
bd = (RIOSubMap *)entry->data;
r_io_submap_set_from (bd, r_io_submap_to (sm) + 1);
}
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
} | 576 | True | 1 |
CVE-2022-0419 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa', 'name': 'https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6', 'name': 'https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/', 'name': 'FEDORA-2022-ba3248e596', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/', 'name': 'FEDORA-2022-3fc85cd09c', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/', 'name': 'https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'http://www.openwall.com/lists/oss-security/2022/05/25/1', 'name': '[oss-security] 20220525 multiple vulnerabilities in radare2', 'refsource': 'MLIST', 'tags': ['Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-476'}, {'lang': 'en', 'value': 'CWE-476'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.'}] | 2022-08-06T03:21Z | 2022-02-01T11:15Z | NULL Pointer Dereference | A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. | NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
| https://cwe.mitre.org/data/definitions/476.html | 0 | pancake | 2022-01-31 02:32:50+01:00 | Fix null deref in xnu.kernelcache ##crash
* Reported by @xshad3 via huntr.dev | feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | load_buffer | load_buffer( RBinFile * bf , void ** bin_obj , RBuffer * buf , ut64 loadaddr , Sdb * sdb) | ['bf', 'bin_obj', 'buf', 'loadaddr', 'sdb'] | static bool load_buffer(RBinFile *bf, void **bin_obj, RBuffer *buf, ut64 loadaddr, Sdb *sdb) {
RBuffer *fbuf = r_buf_ref (buf);
struct MACH0_(opts_t) opts;
MACH0_(opts_set_default) (&opts, bf);
struct MACH0_(obj_t) *main_mach0 = MACH0_(new_buf) (fbuf, &opts);
if (!main_mach0) {
return false;
}
RRebaseInfo *rebase_info = r_rebase_info_new_from_mach0 (fbuf, main_mach0);
RKernelCacheObj *obj = NULL;
RPrelinkRange *prelink_range = get_prelink_info_range_from_mach0 (main_mach0);
if (!prelink_range) {
goto beach;
}
obj = R_NEW0 (RKernelCacheObj);
if (!obj) {
R_FREE (prelink_range);
goto beach;
}
RCFValueDict *prelink_info = NULL;
if (main_mach0->hdr.filetype != MH_FILESET && prelink_range->range.size) {
prelink_info = r_cf_value_dict_parse (fbuf, prelink_range->range.offset,
prelink_range->range.size, R_CF_OPTION_SKIP_NSDATA);
if (!prelink_info) {
R_FREE (prelink_range);
R_FREE (obj);
goto beach;
}
}
if (!pending_bin_files) {
pending_bin_files = r_list_new ();
if (!pending_bin_files) {
R_FREE (prelink_range);
R_FREE (obj);
R_FREE (prelink_info);
goto beach;
}
}
obj->mach0 = main_mach0;
obj->rebase_info = rebase_info;
obj->prelink_info = prelink_info;
obj->cache_buf = fbuf;
obj->pa2va_exec = prelink_range->pa2va_exec;
obj->pa2va_data = prelink_range->pa2va_data;
R_FREE (prelink_range);
*bin_obj = obj;
r_list_push (pending_bin_files, bf);
if (rebase_info || main_mach0->chained_starts) {
RIO *io = bf->rbin->iob.io;
swizzle_io_read (obj, io);
}
return true;
beach:
r_buf_free (fbuf);
obj->cache_buf = NULL;
MACH0_(mach0_free) (main_mach0);
return false;
} | 353 | True | 1 |
CVE-2022-0518 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa', 'name': 'https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184', 'name': 'https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}, {'lang': 'en', 'value': 'CWE-122'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:34Z | 2022-02-08T21:15Z | Heap-based Buffer Overflow | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). | https://cwe.mitre.org/data/definitions/122.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 21:21:21+01:00 | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (obj == NULL) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 415 | True | 1 |
|
CVE-2022-0518 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa', 'name': 'https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184', 'name': 'https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}, {'lang': 'en', 'value': 'CWE-122'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:34Z | 2022-02-08T21:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 21:21:21+01:00 | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (obj == NULL) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 415 | True | 1 |
CVE-2022-0520 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8', 'name': 'https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6', 'name': 'https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}, {'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in NPM radare2.js prior to 5.6.2.'}] | 2022-04-08T13:39Z | 2022-02-08T21:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 21:35:54+01:00 | Fix bins/*/rep8 - UAF crash in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev | 8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_object | get_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_object(RBuffer *buffer) {
bool error = false;
pyc_object *ret = NULL;
ut8 code = get_ut8 (buffer, &error);
bool flag = (code & FLAG_REF);
RListIter *ref_idx = NULL;
ut8 type = (code & ~FLAG_REF);
if (error) {
return NULL;
}
if (flag) {
pyc_object *noneret = get_none_object ();
if (noneret) {
ref_idx = r_list_append (refs, noneret);
}
}
switch (type) {
case TYPE_NULL:
free_object (ret);
return NULL;
case TYPE_TRUE:
return get_true_object ();
case TYPE_FALSE:
free_object (ret);
return get_false_object ();
case TYPE_NONE:
free_object (ret);
return get_none_object ();
case TYPE_REF:
free_object (ret);
return get_ref_object (buffer);
case TYPE_SMALL_TUPLE:
ret = get_small_tuple_object (buffer);
break;
case TYPE_TUPLE:
ret = get_tuple_object (buffer);
break;
case TYPE_STRING:
ret = get_string_object (buffer);
break;
case TYPE_CODE_v0:
ret = get_code_object (buffer);
if (ret) {
ret->type = TYPE_CODE_v0;
}
break;
case TYPE_CODE_v1:
ret = get_code_object (buffer);
if (ret) {
ret->type = TYPE_CODE_v1;
}
break;
case TYPE_INT:
ret = get_int_object (buffer);
break;
case TYPE_ASCII_INTERNED:
ret = get_ascii_interned_object (buffer);
break;
case TYPE_SHORT_ASCII:
ret = get_short_ascii_object (buffer);
break;
case TYPE_ASCII:
ret = get_ascii_object (buffer);
break;
case TYPE_SHORT_ASCII_INTERNED:
ret = get_short_ascii_interned_object (buffer);
break;
case TYPE_INT64:
ret = get_int64_object (buffer);
break;
case TYPE_INTERNED:
ret = get_interned_object (buffer);
break;
case TYPE_STRINGREF:
ret = get_stringref_object (buffer);
break;
case TYPE_FLOAT:
ret = get_float_object (buffer);
break;
case TYPE_BINARY_FLOAT:
ret = get_binary_float_object (buffer);
break;
case TYPE_COMPLEX:
ret = get_complex_object (buffer); // behaviour depends on Python version
break;
case TYPE_BINARY_COMPLEX:
ret = get_binary_complex_object (buffer);
break;
case TYPE_LIST:
ret = get_list_object (buffer);
break;
case TYPE_LONG:
ret = get_long_object (buffer);
break;
case TYPE_UNICODE:
ret = get_unicode_object (buffer);
break;
case TYPE_DICT:
ret = get_dict_object (buffer);
break;
case TYPE_FROZENSET:
case TYPE_SET:
ret = get_set_object (buffer);
break;
case TYPE_STOPITER:
case TYPE_ELLIPSIS:
ret = R_NEW0 (pyc_object);
break;
case TYPE_UNKNOWN:
eprintf ("Get not implemented for type 0x%x\n", type);
r_list_pop (refs);
free_object (ret);
return NULL;
case 0:
// nop
break;
default:
eprintf ("Undefined type in get_object (0x%x)\n", type);
// r_list_pop (refs);
return NULL;
}
if (ret && flag && ref_idx) {
if (ref_idx->data != ret) {
free_object (ref_idx->data);
}
ref_idx->data = copy_object (ret);
}
if (ret) {
return ret;
}
ret = get_none_object ();
if (!ret) {
return NULL;
}
r_list_append (refs, ret);
return ret;
} | 574 | True | 1 |
CVE-2022-0522 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9', 'name': 'https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6', 'name': 'https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-786'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.'}] | 2022-04-08T13:41Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 21:52:26+01:00 | Fix negative index in anal.arm64.cs ##crash
* Reported by Cen Zhang via huntr.dev | d17a7bdf166108a29a27cd89bf454f9fa6c050d6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | vector64_dst_append | vector64_dst_append( RStrBuf * sb , csh * handle , cs_insn * insn , int n , int i) | ['sb', 'handle', 'insn', 'n', 'i'] | static void vector64_dst_append(RStrBuf *sb, csh *handle, cs_insn *insn, int n, int i) {
cs_arm64_op op = INSOP64 (n);
if (op.vector_index != -1) {
i = op.vector_index;
}
#if CS_API_MAJOR == 4
const bool isvessas = (op.vess || op.vas);
#else
const bool isvessas = op.vas;
#endif
if (isvessas && i != -1) {
int size = vector_size (&op);
int shift = i * size;
char *regc = "l";
size_t s = sizeof (bitmask_by_width) / sizeof (*bitmask_by_width);
size_t index = size > 0? (size - 1) % s: 0;
if (index >= BITMASK_BY_WIDTH_COUNT) {
index = 0;
}
ut64 mask = bitmask_by_width[index];
if (shift >= 64) {
shift -= 64;
regc = "h";
}
if (shift > 0 && shift < 64) {
r_strbuf_appendf (sb, "%d,SWAP,0x%"PFMT64x",&,<<,%s%s,0x%"PFMT64x",&,|,%s%s",
shift, mask, REG64 (n), regc, VEC64_MASK (shift, size), REG64 (n), regc);
} else {
int dimsize = size % 64;
r_strbuf_appendf (sb, "0x%"PFMT64x",&,%s%s,0x%"PFMT64x",&,|,%s%s",
mask, REG64 (n), regc, VEC64_MASK (shift, dimsize), REG64 (n), regc);
}
} else {
r_strbuf_appendf (sb, "%s", REG64 (n));
}
} | 276 | True | 1 |
CVE-2022-0522 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9', 'name': 'https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6', 'name': 'https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-786'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.'}] | 2022-04-08T13:41Z | 2022-02-08T21:15Z | Access of Memory Location Before Start of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer. | This typically occurs when a pointer or its index is decremented to a position before the buffer, when pointer arithmetic results in a position before the beginning of the valid memory location, or when a negative index is used.
| https://cwe.mitre.org/data/definitions/786.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 21:52:26+01:00 | Fix negative index in anal.arm64.cs ##crash
* Reported by Cen Zhang via huntr.dev | d17a7bdf166108a29a27cd89bf454f9fa6c050d6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | vector64_dst_append | vector64_dst_append( RStrBuf * sb , csh * handle , cs_insn * insn , int n , int i) | ['sb', 'handle', 'insn', 'n', 'i'] | static void vector64_dst_append(RStrBuf *sb, csh *handle, cs_insn *insn, int n, int i) {
cs_arm64_op op = INSOP64 (n);
if (op.vector_index != -1) {
i = op.vector_index;
}
#if CS_API_MAJOR == 4
const bool isvessas = (op.vess || op.vas);
#else
const bool isvessas = op.vas;
#endif
if (isvessas && i != -1) {
int size = vector_size (&op);
int shift = i * size;
char *regc = "l";
size_t s = sizeof (bitmask_by_width) / sizeof (*bitmask_by_width);
size_t index = size > 0? (size - 1) % s: 0;
if (index >= BITMASK_BY_WIDTH_COUNT) {
index = 0;
}
ut64 mask = bitmask_by_width[index];
if (shift >= 64) {
shift -= 64;
regc = "h";
}
if (shift > 0 && shift < 64) {
r_strbuf_appendf (sb, "%d,SWAP,0x%"PFMT64x",&,<<,%s%s,0x%"PFMT64x",&,|,%s%s",
shift, mask, REG64 (n), regc, VEC64_MASK (shift, size), REG64 (n), regc);
} else {
int dimsize = size % 64;
r_strbuf_appendf (sb, "0x%"PFMT64x",&,%s%s,0x%"PFMT64x",&,|,%s%s",
mask, REG64 (n), regc, VEC64_MASK (shift, dimsize), REG64 (n), regc);
}
} else {
r_strbuf_appendf (sb, "%s", REG64 (n));
}
} | 276 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_array_object_generic | get_array_object_generic( RBuffer * buffer , ut32 size) | ['buffer', 'size'] | static pyc_object *get_array_object_generic(RBuffer *buffer, ut32 size) {
pyc_object *tmp = NULL;
pyc_object *ret = NULL;
ut32 i = 0;
ret = R_NEW0 (pyc_object);
if (!ret) {
return NULL;
}
ret->data = r_list_newf ((RListFree)free_object);
if (!ret->data) {
free (ret);
return NULL;
}
for (i = 0; i < size; i++) {
tmp = get_object (buffer);
if (!tmp) {
r_list_free (ret->data);
R_FREE (ret);
return NULL;
}
if (!r_list_append (ret->data, tmp)) {
free_object (tmp);
r_list_free (ret->data);
free (ret);
return NULL;
}
}
return ret;
} | 155 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Expired Pointer Dereference | The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid. | When a program releases memory, but it maintains a pointer to that memory, then the memory might be re-allocated at a later time. If the original pointer is accessed to read or write data, then this could cause the program to read or modify data that is in use by a different function or process. Depending on how the newly-allocated memory is used, this could lead to a denial of service, information exposure, or code execution.
| https://cwe.mitre.org/data/definitions/825.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_array_object_generic | get_array_object_generic( RBuffer * buffer , ut32 size) | ['buffer', 'size'] | static pyc_object *get_array_object_generic(RBuffer *buffer, ut32 size) {
pyc_object *tmp = NULL;
pyc_object *ret = NULL;
ut32 i = 0;
ret = R_NEW0 (pyc_object);
if (!ret) {
return NULL;
}
ret->data = r_list_newf ((RListFree)free_object);
if (!ret->data) {
free (ret);
return NULL;
}
for (i = 0; i < size; i++) {
tmp = get_object (buffer);
if (!tmp) {
r_list_free (ret->data);
R_FREE (ret);
return NULL;
}
if (!r_list_append (ret->data, tmp)) {
free_object (tmp);
r_list_free (ret->data);
free (ret);
return NULL;
}
}
return ret;
} | 155 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_list_object | get_list_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_list_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = 0;
n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (list size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (ret) {
ret->type = TYPE_LIST;
return ret;
}
return NULL;
} | 86 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Expired Pointer Dereference | The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid. | When a program releases memory, but it maintains a pointer to that memory, then the memory might be re-allocated at a later time. If the original pointer is accessed to read or write data, then this could cause the program to read or modify data that is in use by a different function or process. Depending on how the newly-allocated memory is used, this could lead to a denial of service, information exposure, or code execution.
| https://cwe.mitre.org/data/definitions/825.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_list_object | get_list_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_list_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = 0;
n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (list size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (ret) {
ret->type = TYPE_LIST;
return ret;
}
return NULL;
} | 86 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_set_object | get_set_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_set_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (set size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (!ret) {
return NULL;
}
ret->type = TYPE_SET;
return ret;
} | 83 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Expired Pointer Dereference | The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid. | When a program releases memory, but it maintains a pointer to that memory, then the memory might be re-allocated at a later time. If the original pointer is accessed to read or write data, then this could cause the program to read or modify data that is in use by a different function or process. Depending on how the newly-allocated memory is used, this could lead to a denial of service, information exposure, or code execution.
| https://cwe.mitre.org/data/definitions/825.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_set_object | get_set_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_set_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (set size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (!ret) {
return NULL;
}
ret->type = TYPE_SET;
return ret;
} | 83 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_tuple_object | get_tuple_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_tuple_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = 0;
n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (tuple size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (ret) {
ret->type = TYPE_TUPLE;
return ret;
}
return NULL;
} | 86 | True | 1 |
CVE-2022-0523 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'name': 'https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'name': 'https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-825'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:43Z | 2022-02-08T21:15Z | Expired Pointer Dereference | The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid. | When a program releases memory, but it maintains a pointer to that memory, then the memory might be re-allocated at a later time. If the original pointer is accessed to read or write data, then this could cause the program to read or modify data that is in use by a different function or process. Depending on how the newly-allocated memory is used, this could lead to a denial of service, information exposure, or code execution.
| https://cwe.mitre.org/data/definitions/825.html | 0 | Sergi Àlvarez i Capilla | 2022-02-07 22:05:23+01:00 | Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | get_tuple_object | get_tuple_object( RBuffer * buffer) | ['buffer'] | static pyc_object *get_tuple_object(RBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
ut32 n = 0;
n = get_ut32 (buffer, &error);
if (n > ST32_MAX) {
eprintf ("bad marshal data (tuple size out of range)\n");
return NULL;
}
if (error) {
return NULL;
}
ret = get_array_object_generic (buffer, n);
if (ret) {
ret->type = TYPE_TUPLE;
return ret;
}
return NULL;
} | 86 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_default_attr_new | r_bin_java_annotation_default_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_annotation_default_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = NULL;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr && sz >= offset) {
attr->type = R_BIN_JAVA_ATTR_TYPE_ANNOTATION_DEFAULT_ATTR;
attr->info.annotation_default_attr.default_value = r_bin_java_element_value_new (buffer + offset, sz - offset, buf_offset + offset);
if (attr->info.annotation_default_attr.default_value) {
offset += attr->info.annotation_default_attr.default_value->size;
}
}
r_bin_java_print_annotation_default_attr_summary (attr);
return attr;
} | 117 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_default_attr_new | r_bin_java_annotation_default_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_annotation_default_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = NULL;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr && sz >= offset) {
attr->type = R_BIN_JAVA_ATTR_TYPE_ANNOTATION_DEFAULT_ATTR;
attr->info.annotation_default_attr.default_value = r_bin_java_element_value_new (buffer + offset, sz - offset, buf_offset + offset);
if (attr->info.annotation_default_attr.default_value) {
offset += attr->info.annotation_default_attr.default_value->size;
}
}
r_bin_java_print_annotation_default_attr_summary (attr);
return attr;
} | 117 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_default_attr_new | r_bin_java_annotation_default_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_annotation_default_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = NULL;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr && sz >= offset) {
attr->type = R_BIN_JAVA_ATTR_TYPE_ANNOTATION_DEFAULT_ATTR;
attr->info.annotation_default_attr.default_value = r_bin_java_element_value_new (buffer + offset, sz - offset, buf_offset + offset);
if (attr->info.annotation_default_attr.default_value) {
offset += attr->info.annotation_default_attr.default_value->size;
}
}
r_bin_java_print_annotation_default_attr_summary (attr);
return attr;
} | 117 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_default_attr_new | r_bin_java_annotation_default_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_annotation_default_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = NULL;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr && sz >= offset) {
attr->type = R_BIN_JAVA_ATTR_TYPE_ANNOTATION_DEFAULT_ATTR;
attr->info.annotation_default_attr.default_value = r_bin_java_element_value_new (buffer + offset, sz - offset, buf_offset + offset);
if (attr->info.annotation_default_attr.default_value) {
offset += attr->info.annotation_default_attr.default_value->size;
}
}
r_bin_java_print_annotation_default_attr_summary (attr);
return attr;
} | 117 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_new | r_bin_java_annotation_new( ut8 * buffer , ut64 sz , ut64 buf_offset) | ['buffer', 'sz', 'buf_offset'] | R_API RBinJavaAnnotation *r_bin_java_annotation_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
RBinJavaAnnotation *annotation = NULL;
RBinJavaElementValuePair *evps = NULL;
ut64 offset = 0;
annotation = R_NEW0 (RBinJavaAnnotation);
if (!annotation) {
return NULL;
}
// (ut16) read and set annotation_value.type_idx;
annotation->type_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
// (ut16) read and set annotation_value.num_element_value_pairs;
annotation->num_element_value_pairs = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
annotation->element_value_pairs = r_list_newf (r_bin_java_element_pair_free);
// read annotation_value.num_element_value_pairs, and append to annotation_value.element_value_pairs
for (i = 0; i < annotation->num_element_value_pairs; i++) {
if (offset > sz) {
break;
}
evps = r_bin_java_element_pair_new (buffer + offset, sz - offset, buf_offset + offset);
if (evps) {
offset += evps->size;
r_list_append (annotation->element_value_pairs, (void *) evps);
}
}
annotation->size = offset;
return annotation;
} | 170 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_new | r_bin_java_annotation_new( ut8 * buffer , ut64 sz , ut64 buf_offset) | ['buffer', 'sz', 'buf_offset'] | R_API RBinJavaAnnotation *r_bin_java_annotation_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
RBinJavaAnnotation *annotation = NULL;
RBinJavaElementValuePair *evps = NULL;
ut64 offset = 0;
annotation = R_NEW0 (RBinJavaAnnotation);
if (!annotation) {
return NULL;
}
// (ut16) read and set annotation_value.type_idx;
annotation->type_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
// (ut16) read and set annotation_value.num_element_value_pairs;
annotation->num_element_value_pairs = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
annotation->element_value_pairs = r_list_newf (r_bin_java_element_pair_free);
// read annotation_value.num_element_value_pairs, and append to annotation_value.element_value_pairs
for (i = 0; i < annotation->num_element_value_pairs; i++) {
if (offset > sz) {
break;
}
evps = r_bin_java_element_pair_new (buffer + offset, sz - offset, buf_offset + offset);
if (evps) {
offset += evps->size;
r_list_append (annotation->element_value_pairs, (void *) evps);
}
}
annotation->size = offset;
return annotation;
} | 170 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_new | r_bin_java_annotation_new( ut8 * buffer , ut64 sz , ut64 buf_offset) | ['buffer', 'sz', 'buf_offset'] | R_API RBinJavaAnnotation *r_bin_java_annotation_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
RBinJavaAnnotation *annotation = NULL;
RBinJavaElementValuePair *evps = NULL;
ut64 offset = 0;
annotation = R_NEW0 (RBinJavaAnnotation);
if (!annotation) {
return NULL;
}
// (ut16) read and set annotation_value.type_idx;
annotation->type_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
// (ut16) read and set annotation_value.num_element_value_pairs;
annotation->num_element_value_pairs = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
annotation->element_value_pairs = r_list_newf (r_bin_java_element_pair_free);
// read annotation_value.num_element_value_pairs, and append to annotation_value.element_value_pairs
for (i = 0; i < annotation->num_element_value_pairs; i++) {
if (offset > sz) {
break;
}
evps = r_bin_java_element_pair_new (buffer + offset, sz - offset, buf_offset + offset);
if (evps) {
offset += evps->size;
r_list_append (annotation->element_value_pairs, (void *) evps);
}
}
annotation->size = offset;
return annotation;
} | 170 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_annotation_new | r_bin_java_annotation_new( ut8 * buffer , ut64 sz , ut64 buf_offset) | ['buffer', 'sz', 'buf_offset'] | R_API RBinJavaAnnotation *r_bin_java_annotation_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
RBinJavaAnnotation *annotation = NULL;
RBinJavaElementValuePair *evps = NULL;
ut64 offset = 0;
annotation = R_NEW0 (RBinJavaAnnotation);
if (!annotation) {
return NULL;
}
// (ut16) read and set annotation_value.type_idx;
annotation->type_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
// (ut16) read and set annotation_value.num_element_value_pairs;
annotation->num_element_value_pairs = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
annotation->element_value_pairs = r_list_newf (r_bin_java_element_pair_free);
// read annotation_value.num_element_value_pairs, and append to annotation_value.element_value_pairs
for (i = 0; i < annotation->num_element_value_pairs; i++) {
if (offset > sz) {
break;
}
evps = r_bin_java_element_pair_new (buffer + offset, sz - offset, buf_offset + offset);
if (evps) {
offset += evps->size;
r_list_append (annotation->element_value_pairs, (void *) evps);
}
}
annotation->size = offset;
return annotation;
} | 170 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_element_pair_calc_size | r_bin_java_element_pair_calc_size( RBinJavaElementValuePair * evp) | ['evp'] | R_API ut64 r_bin_java_element_pair_calc_size(RBinJavaElementValuePair *evp) {
ut64 sz = 0;
if (evp == NULL) {
return sz;
}
// evp->element_name_idx = r_bin_java_read_short(bin, bin->b->cur);
sz += 2;
// evp->value = r_bin_java_element_value_new (bin, offset+2);
if (evp->value) {
sz += r_bin_java_element_value_calc_size (evp->value);
}
return sz;
} | 48 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_element_pair_calc_size | r_bin_java_element_pair_calc_size( RBinJavaElementValuePair * evp) | ['evp'] | R_API ut64 r_bin_java_element_pair_calc_size(RBinJavaElementValuePair *evp) {
ut64 sz = 0;
if (evp == NULL) {
return sz;
}
// evp->element_name_idx = r_bin_java_read_short(bin, bin->b->cur);
sz += 2;
// evp->value = r_bin_java_element_value_new (bin, offset+2);
if (evp->value) {
sz += r_bin_java_element_value_calc_size (evp->value);
}
return sz;
} | 48 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_element_pair_calc_size | r_bin_java_element_pair_calc_size( RBinJavaElementValuePair * evp) | ['evp'] | R_API ut64 r_bin_java_element_pair_calc_size(RBinJavaElementValuePair *evp) {
ut64 sz = 0;
if (evp == NULL) {
return sz;
}
// evp->element_name_idx = r_bin_java_read_short(bin, bin->b->cur);
sz += 2;
// evp->value = r_bin_java_element_value_new (bin, offset+2);
if (evp->value) {
sz += r_bin_java_element_value_calc_size (evp->value);
}
return sz;
} | 48 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_element_pair_calc_size | r_bin_java_element_pair_calc_size( RBinJavaElementValuePair * evp) | ['evp'] | R_API ut64 r_bin_java_element_pair_calc_size(RBinJavaElementValuePair *evp) {
ut64 sz = 0;
if (evp == NULL) {
return sz;
}
// evp->element_name_idx = r_bin_java_read_short(bin, bin->b->cur);
sz += 2;
// evp->value = r_bin_java_element_value_new (bin, offset+2);
if (evp->value) {
sz += r_bin_java_element_value_calc_size (evp->value);
}
return sz;
} | 48 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
return NULL;
}
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (!obj) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf ("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 436 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
return NULL;
}
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (!obj) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf ("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 436 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
return NULL;
}
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (!obj) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf ("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 436 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_inner_classes_attr_new | r_bin_java_inner_classes_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
return NULL;
}
if (attr == NULL) {
// TODO eprintf
return attr;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_INNER_CLASSES_ATTR;
attr->info.inner_classes_attr.number_of_classes = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.inner_classes_attr.classes = r_list_newf (r_bin_java_inner_classes_attr_entry_free);
for (i = 0; i < attr->info.inner_classes_attr.number_of_classes; i++) {
curpos = buf_offset + offset;
if (buf_offset + offset + 8 > sz) {
eprintf ("Invalid amount of inner classes\n");
break;
}
icattr = R_NEW0 (RBinJavaClassesAttribute);
if (!icattr) {
break;
}
icattr->inner_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->outer_class_info_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->inner_class_access_flags = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
icattr->flags_str = retrieve_class_method_access_string (icattr->inner_class_access_flags);
icattr->file_offset = curpos;
icattr->size = 8;
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_name_idx);
if (!obj) {
eprintf ("BINCPLIS IS HULL %d\n", icattr->inner_name_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
obj = r_bin_java_get_item_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, icattr->inner_class_info_idx);
if (!obj) {
eprintf ("BINCPLIST IS NULL %d\n", icattr->inner_class_info_idx);
}
icattr->name = r_bin_java_get_item_name_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, obj);
if (!icattr->name) {
icattr->name = r_str_dup (NULL, "NULL");
eprintf ("r_bin_java_inner_classes_attr: Unable to find the name for %d index.\n", icattr->inner_name_idx);
free (icattr);
break;
}
}
IFDBG eprintf ("r_bin_java_inner_classes_attr: Inner class name %d is %s.\n", icattr->inner_name_idx, icattr->name);
r_list_append (attr->info.inner_classes_attr.classes, (void *) icattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_inner_classes_attr_summary(attr);
return attr;
} | 436 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_local_variable_table_attr_new | r_bin_java_local_variable_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_local_variable_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaLocalVariableAttribute *lvattr;
ut64 curpos = 0, offset = 6;
RBinJavaAttrInfo *attr;
ut32 i = 0;
if (!buffer || sz < 1) {
return NULL;
}
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_LOCAL_VARIABLE_TABLE_ATTR;
attr->info.local_variable_table_attr.table_length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.local_variable_table_attr.local_variable_table =\
r_list_newf (r_bin_java_local_variable_table_attr_entry_free);
for (i = 0; i < attr->info.local_variable_table_attr.table_length; i++) {
if (offset + 10 > sz) {
break;
}
curpos = buf_offset + offset;
lvattr = R_NEW0 (RBinJavaLocalVariableAttribute);
if (!lvattr) {
break;
}
lvattr->start_pc = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->descriptor_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->index = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->file_offset = curpos;
lvattr->name = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->name_idx);
lvattr->size = 10;
if (!lvattr->name) {
lvattr->name = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the name for %d index.\n", lvattr->name_idx);
}
lvattr->descriptor = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->descriptor_idx);
if (!lvattr->descriptor) {
lvattr->descriptor = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the descriptor for %d index.\n", lvattr->descriptor_idx);
}
r_list_append (attr->info.local_variable_table_attr.local_variable_table, lvattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_local_variable_table_attr_summary(attr);
return attr;
} | 360 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_local_variable_table_attr_new | r_bin_java_local_variable_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_local_variable_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaLocalVariableAttribute *lvattr;
ut64 curpos = 0, offset = 6;
RBinJavaAttrInfo *attr;
ut32 i = 0;
if (!buffer || sz < 1) {
return NULL;
}
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_LOCAL_VARIABLE_TABLE_ATTR;
attr->info.local_variable_table_attr.table_length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.local_variable_table_attr.local_variable_table =\
r_list_newf (r_bin_java_local_variable_table_attr_entry_free);
for (i = 0; i < attr->info.local_variable_table_attr.table_length; i++) {
if (offset + 10 > sz) {
break;
}
curpos = buf_offset + offset;
lvattr = R_NEW0 (RBinJavaLocalVariableAttribute);
if (!lvattr) {
break;
}
lvattr->start_pc = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->descriptor_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->index = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->file_offset = curpos;
lvattr->name = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->name_idx);
lvattr->size = 10;
if (!lvattr->name) {
lvattr->name = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the name for %d index.\n", lvattr->name_idx);
}
lvattr->descriptor = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->descriptor_idx);
if (!lvattr->descriptor) {
lvattr->descriptor = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the descriptor for %d index.\n", lvattr->descriptor_idx);
}
r_list_append (attr->info.local_variable_table_attr.local_variable_table, lvattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_local_variable_table_attr_summary(attr);
return attr;
} | 360 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_local_variable_table_attr_new | r_bin_java_local_variable_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_local_variable_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaLocalVariableAttribute *lvattr;
ut64 curpos = 0, offset = 6;
RBinJavaAttrInfo *attr;
ut32 i = 0;
if (!buffer || sz < 1) {
return NULL;
}
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_LOCAL_VARIABLE_TABLE_ATTR;
attr->info.local_variable_table_attr.table_length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.local_variable_table_attr.local_variable_table =\
r_list_newf (r_bin_java_local_variable_table_attr_entry_free);
for (i = 0; i < attr->info.local_variable_table_attr.table_length; i++) {
if (offset + 10 > sz) {
break;
}
curpos = buf_offset + offset;
lvattr = R_NEW0 (RBinJavaLocalVariableAttribute);
if (!lvattr) {
break;
}
lvattr->start_pc = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->descriptor_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->index = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->file_offset = curpos;
lvattr->name = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->name_idx);
lvattr->size = 10;
if (!lvattr->name) {
lvattr->name = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the name for %d index.\n", lvattr->name_idx);
}
lvattr->descriptor = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->descriptor_idx);
if (!lvattr->descriptor) {
lvattr->descriptor = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the descriptor for %d index.\n", lvattr->descriptor_idx);
}
r_list_append (attr->info.local_variable_table_attr.local_variable_table, lvattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_local_variable_table_attr_summary(attr);
return attr;
} | 360 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_local_variable_table_attr_new | r_bin_java_local_variable_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_local_variable_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaLocalVariableAttribute *lvattr;
ut64 curpos = 0, offset = 6;
RBinJavaAttrInfo *attr;
ut32 i = 0;
if (!buffer || sz < 1) {
return NULL;
}
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_LOCAL_VARIABLE_TABLE_ATTR;
attr->info.local_variable_table_attr.table_length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.local_variable_table_attr.local_variable_table =\
r_list_newf (r_bin_java_local_variable_table_attr_entry_free);
for (i = 0; i < attr->info.local_variable_table_attr.table_length; i++) {
if (offset + 10 > sz) {
break;
}
curpos = buf_offset + offset;
lvattr = R_NEW0 (RBinJavaLocalVariableAttribute);
if (!lvattr) {
break;
}
lvattr->start_pc = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->length = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->name_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->descriptor_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->index = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
lvattr->file_offset = curpos;
lvattr->name = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->name_idx);
lvattr->size = 10;
if (!lvattr->name) {
lvattr->name = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the name for %d index.\n", lvattr->name_idx);
}
lvattr->descriptor = r_bin_java_get_utf8_from_bin_cp_list (R_BIN_JAVA_GLOBAL_BIN, lvattr->descriptor_idx);
if (!lvattr->descriptor) {
lvattr->descriptor = strdup ("NULL");
eprintf ("r_bin_java_local_variable_table_attr_new: Unable to find the descriptor for %d index.\n", lvattr->descriptor_idx);
}
r_list_append (attr->info.local_variable_table_attr.local_variable_table, lvattr);
}
attr->size = offset;
// IFDBG r_bin_java_print_local_variable_table_attr_summary(attr);
return attr;
} | 360 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_rtv_annotations_attr_new | r_bin_java_rtv_annotations_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_rtv_annotations_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
if (buf_offset + 8 > sz) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr) {
attr->type = R_BIN_JAVA_ATTR_TYPE_RUNTIME_VISIBLE_ANNOTATION_ATTR;
attr->info.annotation_array.num_annotations = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.annotation_array.annotations = r_list_newf (r_bin_java_annotation_free);
for (i = 0; i < attr->info.annotation_array.num_annotations; i++) {
if (offset >= sz) {
break;
}
RBinJavaAnnotation *annotation = r_bin_java_annotation_new (buffer + offset, sz - offset, buf_offset + offset);
if (annotation) {
offset += annotation->size;
r_list_append (attr->info.annotation_array.annotations, (void *) annotation);
}
}
attr->size = offset;
}
return attr;
} | 192 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_rtv_annotations_attr_new | r_bin_java_rtv_annotations_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_rtv_annotations_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
if (buf_offset + 8 > sz) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr) {
attr->type = R_BIN_JAVA_ATTR_TYPE_RUNTIME_VISIBLE_ANNOTATION_ATTR;
attr->info.annotation_array.num_annotations = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.annotation_array.annotations = r_list_newf (r_bin_java_annotation_free);
for (i = 0; i < attr->info.annotation_array.num_annotations; i++) {
if (offset >= sz) {
break;
}
RBinJavaAnnotation *annotation = r_bin_java_annotation_new (buffer + offset, sz - offset, buf_offset + offset);
if (annotation) {
offset += annotation->size;
r_list_append (attr->info.annotation_array.annotations, (void *) annotation);
}
}
attr->size = offset;
}
return attr;
} | 192 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_rtv_annotations_attr_new | r_bin_java_rtv_annotations_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_rtv_annotations_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
if (buf_offset + 8 > sz) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr) {
attr->type = R_BIN_JAVA_ATTR_TYPE_RUNTIME_VISIBLE_ANNOTATION_ATTR;
attr->info.annotation_array.num_annotations = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.annotation_array.annotations = r_list_newf (r_bin_java_annotation_free);
for (i = 0; i < attr->info.annotation_array.num_annotations; i++) {
if (offset >= sz) {
break;
}
RBinJavaAnnotation *annotation = r_bin_java_annotation_new (buffer + offset, sz - offset, buf_offset + offset);
if (annotation) {
offset += annotation->size;
r_list_append (attr->info.annotation_array.annotations, (void *) annotation);
}
}
attr->size = offset;
}
return attr;
} | 192 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_rtv_annotations_attr_new | r_bin_java_rtv_annotations_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_rtv_annotations_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
if (buf_offset + 8 > sz) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (attr) {
attr->type = R_BIN_JAVA_ATTR_TYPE_RUNTIME_VISIBLE_ANNOTATION_ATTR;
attr->info.annotation_array.num_annotations = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->info.annotation_array.annotations = r_list_newf (r_bin_java_annotation_free);
for (i = 0; i < attr->info.annotation_array.num_annotations; i++) {
if (offset >= sz) {
break;
}
RBinJavaAnnotation *annotation = r_bin_java_annotation_new (buffer + offset, sz - offset, buf_offset + offset);
if (annotation) {
offset += annotation->size;
r_list_append (attr->info.annotation_array.annotations, (void *) annotation);
}
}
attr->size = offset;
}
return attr;
} | 192 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_source_code_file_attr_new | r_bin_java_source_code_file_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_source_code_file_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
if (!sz) {
return NULL;
}
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_SOURCE_FILE_ATTR;
// if (buffer + offset > buffer + sz) return NULL;
attr->info.source_file_attr.sourcefile_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->size = offset;
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
return attr;
} | 96 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_source_code_file_attr_new | r_bin_java_source_code_file_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_source_code_file_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
if (!sz) {
return NULL;
}
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_SOURCE_FILE_ATTR;
// if (buffer + offset > buffer + sz) return NULL;
attr->info.source_file_attr.sourcefile_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->size = offset;
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
return attr;
} | 96 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_source_code_file_attr_new | r_bin_java_source_code_file_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_source_code_file_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
if (!sz) {
return NULL;
}
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_SOURCE_FILE_ATTR;
// if (buffer + offset > buffer + sz) return NULL;
attr->info.source_file_attr.sourcefile_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->size = offset;
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
return attr;
} | 96 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_source_code_file_attr_new | r_bin_java_source_code_file_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_source_code_file_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
if (!sz) {
return NULL;
}
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
if (!attr) {
return NULL;
}
attr->type = R_BIN_JAVA_ATTR_TYPE_SOURCE_FILE_ATTR;
// if (buffer + offset > buffer + sz) return NULL;
attr->info.source_file_attr.sourcefile_idx = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
attr->size = offset;
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
return attr;
} | 96 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_stack_map_table_attr_new | r_bin_java_stack_map_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_stack_map_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
RBinJavaStackMapFrame *stack_frame = NULL, *new_stack_frame = NULL;
if (sz < 10) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
IFDBG eprintf("r_bin_java_stack_map_table_attr_new: New stack map allocated.\n");
if (!attr) {
return NULL;
}
attr->info.stack_map_table_attr.stack_map_frame_entries = r_list_newf (r_bin_java_stack_frame_free);
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
// Current spec does not call for variable sizes.
attr->info.stack_map_table_attr.number_of_entries = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
IFDBG eprintf ("r_bin_java_stack_map_table_attr_new: Processing stack map, summary is:\n");
IFDBG r_bin_java_print_stack_map_table_attr_summary(attr);
for (i = 0; i < attr->info.stack_map_table_attr.number_of_entries; i++) {
// read next stack frame
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
if (stack_frame == NULL && R_BIN_JAVA_GLOBAL_BIN && R_BIN_JAVA_GLOBAL_BIN->current_code_attr) {
IFDBG eprintf ("Setting an implicit frame at #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
stack_frame = R_BIN_JAVA_GLOBAL_BIN->current_code_attr->info.code_attr.implicit_frame;
}
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x ", current stack_frame: %p\n", i, buf_offset + offset, stack_frame);
if (offset >= sz) {
r_bin_java_stack_map_table_attr_free (attr);
return NULL;
}
new_stack_frame = r_bin_java_stack_map_frame_new (buffer + offset, sz - offset, stack_frame, buf_offset + offset);
if (new_stack_frame) {
offset += new_stack_frame->size;
// append stack frame to the list
r_list_append (attr->info.stack_map_table_attr.stack_map_frame_entries, (void *) new_stack_frame);
stack_frame = new_stack_frame;
} else {
eprintf ("r_bin_java_stack_map_table_attr_new: Unable to parse the stack frame for the stack map table.\n");
r_bin_java_stack_map_table_attr_free (attr);
attr = NULL;
break;
}
}
if (attr) {
attr->size = offset;
}
return attr;
} | 322 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_stack_map_table_attr_new | r_bin_java_stack_map_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_stack_map_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
RBinJavaStackMapFrame *stack_frame = NULL, *new_stack_frame = NULL;
if (sz < 10) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
IFDBG eprintf("r_bin_java_stack_map_table_attr_new: New stack map allocated.\n");
if (!attr) {
return NULL;
}
attr->info.stack_map_table_attr.stack_map_frame_entries = r_list_newf (r_bin_java_stack_frame_free);
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
// Current spec does not call for variable sizes.
attr->info.stack_map_table_attr.number_of_entries = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
IFDBG eprintf ("r_bin_java_stack_map_table_attr_new: Processing stack map, summary is:\n");
IFDBG r_bin_java_print_stack_map_table_attr_summary(attr);
for (i = 0; i < attr->info.stack_map_table_attr.number_of_entries; i++) {
// read next stack frame
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
if (stack_frame == NULL && R_BIN_JAVA_GLOBAL_BIN && R_BIN_JAVA_GLOBAL_BIN->current_code_attr) {
IFDBG eprintf ("Setting an implicit frame at #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
stack_frame = R_BIN_JAVA_GLOBAL_BIN->current_code_attr->info.code_attr.implicit_frame;
}
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x ", current stack_frame: %p\n", i, buf_offset + offset, stack_frame);
if (offset >= sz) {
r_bin_java_stack_map_table_attr_free (attr);
return NULL;
}
new_stack_frame = r_bin_java_stack_map_frame_new (buffer + offset, sz - offset, stack_frame, buf_offset + offset);
if (new_stack_frame) {
offset += new_stack_frame->size;
// append stack frame to the list
r_list_append (attr->info.stack_map_table_attr.stack_map_frame_entries, (void *) new_stack_frame);
stack_frame = new_stack_frame;
} else {
eprintf ("r_bin_java_stack_map_table_attr_new: Unable to parse the stack frame for the stack map table.\n");
r_bin_java_stack_map_table_attr_free (attr);
attr = NULL;
break;
}
}
if (attr) {
attr->size = offset;
}
return attr;
} | 322 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_stack_map_table_attr_new | r_bin_java_stack_map_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_stack_map_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
RBinJavaStackMapFrame *stack_frame = NULL, *new_stack_frame = NULL;
if (sz < 10) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
IFDBG eprintf("r_bin_java_stack_map_table_attr_new: New stack map allocated.\n");
if (!attr) {
return NULL;
}
attr->info.stack_map_table_attr.stack_map_frame_entries = r_list_newf (r_bin_java_stack_frame_free);
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
// Current spec does not call for variable sizes.
attr->info.stack_map_table_attr.number_of_entries = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
IFDBG eprintf ("r_bin_java_stack_map_table_attr_new: Processing stack map, summary is:\n");
IFDBG r_bin_java_print_stack_map_table_attr_summary(attr);
for (i = 0; i < attr->info.stack_map_table_attr.number_of_entries; i++) {
// read next stack frame
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
if (stack_frame == NULL && R_BIN_JAVA_GLOBAL_BIN && R_BIN_JAVA_GLOBAL_BIN->current_code_attr) {
IFDBG eprintf ("Setting an implicit frame at #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
stack_frame = R_BIN_JAVA_GLOBAL_BIN->current_code_attr->info.code_attr.implicit_frame;
}
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x ", current stack_frame: %p\n", i, buf_offset + offset, stack_frame);
if (offset >= sz) {
r_bin_java_stack_map_table_attr_free (attr);
return NULL;
}
new_stack_frame = r_bin_java_stack_map_frame_new (buffer + offset, sz - offset, stack_frame, buf_offset + offset);
if (new_stack_frame) {
offset += new_stack_frame->size;
// append stack frame to the list
r_list_append (attr->info.stack_map_table_attr.stack_map_frame_entries, (void *) new_stack_frame);
stack_frame = new_stack_frame;
} else {
eprintf ("r_bin_java_stack_map_table_attr_new: Unable to parse the stack frame for the stack map table.\n");
r_bin_java_stack_map_table_attr_free (attr);
attr = NULL;
break;
}
}
if (attr) {
attr->size = offset;
}
return attr;
} | 322 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_stack_map_table_attr_new | r_bin_java_stack_map_table_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_stack_map_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 offset = 0;
RBinJavaStackMapFrame *stack_frame = NULL, *new_stack_frame = NULL;
if (sz < 10) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offset += 6;
IFDBG eprintf("r_bin_java_stack_map_table_attr_new: New stack map allocated.\n");
if (!attr) {
return NULL;
}
attr->info.stack_map_table_attr.stack_map_frame_entries = r_list_newf (r_bin_java_stack_frame_free);
// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);
// Current spec does not call for variable sizes.
attr->info.stack_map_table_attr.number_of_entries = R_BIN_JAVA_USHORT (buffer, offset);
offset += 2;
IFDBG eprintf ("r_bin_java_stack_map_table_attr_new: Processing stack map, summary is:\n");
IFDBG r_bin_java_print_stack_map_table_attr_summary(attr);
for (i = 0; i < attr->info.stack_map_table_attr.number_of_entries; i++) {
// read next stack frame
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
if (stack_frame == NULL && R_BIN_JAVA_GLOBAL_BIN && R_BIN_JAVA_GLOBAL_BIN->current_code_attr) {
IFDBG eprintf ("Setting an implicit frame at #%d @ 0x%08"PFMT64x "\n", i, buf_offset + offset);
stack_frame = R_BIN_JAVA_GLOBAL_BIN->current_code_attr->info.code_attr.implicit_frame;
}
IFDBG eprintf ("Reading StackMap Entry #%d @ 0x%08"PFMT64x ", current stack_frame: %p\n", i, buf_offset + offset, stack_frame);
if (offset >= sz) {
r_bin_java_stack_map_table_attr_free (attr);
return NULL;
}
new_stack_frame = r_bin_java_stack_map_frame_new (buffer + offset, sz - offset, stack_frame, buf_offset + offset);
if (new_stack_frame) {
offset += new_stack_frame->size;
// append stack frame to the list
r_list_append (attr->info.stack_map_table_attr.stack_map_frame_entries, (void *) new_stack_frame);
stack_frame = new_stack_frame;
} else {
eprintf ("r_bin_java_stack_map_table_attr_new: Unable to parse the stack frame for the stack map table.\n");
r_bin_java_stack_map_table_attr_free (attr);
attr = NULL;
break;
}
}
if (attr) {
attr->size = offset;
}
return attr;
} | 322 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_synthetic_attr_new | r_bin_java_synthetic_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_synthetic_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = R_BIN_JAVA_ATTR_TYPE_SYNTHETIC_ATTR;
attr->size = offset;
return attr;
} | 67 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_synthetic_attr_new | r_bin_java_synthetic_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_synthetic_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = R_BIN_JAVA_ATTR_TYPE_SYNTHETIC_ATTR;
attr->size = offset;
return attr;
} | 67 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_synthetic_attr_new | r_bin_java_synthetic_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_synthetic_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = R_BIN_JAVA_ATTR_TYPE_SYNTHETIC_ATTR;
attr->size = offset;
return attr;
} | 67 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_synthetic_attr_new | r_bin_java_synthetic_attr_new( RBinJavaObj * bin , ut8 * buffer , ut64 sz , ut64 buf_offset) | ['bin', 'buffer', 'sz', 'buf_offset'] | R_API RBinJavaAttrInfo *r_bin_java_synthetic_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut64 offset = 0;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = R_BIN_JAVA_ATTR_TYPE_SYNTHETIC_ATTR;
attr->size = offset;
return attr;
} | 67 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_verification_info_from_type | r_bin_java_verification_info_from_type( RBinJavaObj * bin , R_BIN_JAVA_STACKMAP_TYPE type , ut32 value) | ['bin', 'type', 'value'] | R_API RBinJavaVerificationObj *r_bin_java_verification_info_from_type(RBinJavaObj *bin, R_BIN_JAVA_STACKMAP_TYPE type, ut32 value) {
RBinJavaVerificationObj *se = R_NEW0 (RBinJavaVerificationObj);
if (!se) {
return NULL;
}
se->tag = type;
if (se->tag == R_BIN_JAVA_STACKMAP_OBJECT) {
se->info.obj_val_cp_idx = (ut16) value;
} else if (se->tag == R_BIN_JAVA_STACKMAP_UNINIT) {
/*if (bin->offset_sz == 4) {
se->info.uninit_offset = value;
} else {
se->info.uninit_offset = (ut16) value;
}*/
se->info.uninit_offset = (ut16) value;
}
return se;
} | 85 | True | 1 |
CVE-2022-0519 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'name': 'https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:36Z | 2022-02-08T21:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_verification_info_from_type | r_bin_java_verification_info_from_type( RBinJavaObj * bin , R_BIN_JAVA_STACKMAP_TYPE type , ut32 value) | ['bin', 'type', 'value'] | R_API RBinJavaVerificationObj *r_bin_java_verification_info_from_type(RBinJavaObj *bin, R_BIN_JAVA_STACKMAP_TYPE type, ut32 value) {
RBinJavaVerificationObj *se = R_NEW0 (RBinJavaVerificationObj);
if (!se) {
return NULL;
}
se->tag = type;
if (se->tag == R_BIN_JAVA_STACKMAP_OBJECT) {
se->info.obj_val_cp_idx = (ut16) value;
} else if (se->tag == R_BIN_JAVA_STACKMAP_UNINIT) {
/*if (bin->offset_sz == 4) {
se->info.uninit_offset = value;
} else {
se->info.uninit_offset = (ut16) value;
}*/
se->info.uninit_offset = (ut16) value;
}
return se;
} | 85 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_verification_info_from_type | r_bin_java_verification_info_from_type( RBinJavaObj * bin , R_BIN_JAVA_STACKMAP_TYPE type , ut32 value) | ['bin', 'type', 'value'] | R_API RBinJavaVerificationObj *r_bin_java_verification_info_from_type(RBinJavaObj *bin, R_BIN_JAVA_STACKMAP_TYPE type, ut32 value) {
RBinJavaVerificationObj *se = R_NEW0 (RBinJavaVerificationObj);
if (!se) {
return NULL;
}
se->tag = type;
if (se->tag == R_BIN_JAVA_STACKMAP_OBJECT) {
se->info.obj_val_cp_idx = (ut16) value;
} else if (se->tag == R_BIN_JAVA_STACKMAP_UNINIT) {
/*if (bin->offset_sz == 4) {
se->info.uninit_offset = value;
} else {
se->info.uninit_offset = (ut16) value;
}*/
se->info.uninit_offset = (ut16) value;
}
return se;
} | 85 | True | 1 |
CVE-2022-0521 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'name': 'https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'name': 'https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}, {'lang': 'en', 'value': 'CWE-788'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:40Z | 2022-02-08T21:15Z | Access of Memory Location After End of Buffer | The software reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer. | This typically occurs when a pointer or its index is incremented to a position after the buffer; or when pointer arithmetic results in a position after the buffer.
| https://cwe.mitre.org/data/definitions/788.html | 0 | Sergi Àlvarez i Capilla | 2022-02-08 14:50:10+01:00 | Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_java_verification_info_from_type | r_bin_java_verification_info_from_type( RBinJavaObj * bin , R_BIN_JAVA_STACKMAP_TYPE type , ut32 value) | ['bin', 'type', 'value'] | R_API RBinJavaVerificationObj *r_bin_java_verification_info_from_type(RBinJavaObj *bin, R_BIN_JAVA_STACKMAP_TYPE type, ut32 value) {
RBinJavaVerificationObj *se = R_NEW0 (RBinJavaVerificationObj);
if (!se) {
return NULL;
}
se->tag = type;
if (se->tag == R_BIN_JAVA_STACKMAP_OBJECT) {
se->info.obj_val_cp_idx = (ut16) value;
} else if (se->tag == R_BIN_JAVA_STACKMAP_UNINIT) {
/*if (bin->offset_sz == 4) {
se->info.uninit_offset = value;
} else {
se->info.uninit_offset = (ut16) value;
}*/
se->info.uninit_offset = (ut16) value;
}
return se;
} | 85 | True | 1 |
CVE-2022-0559 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e', 'name': 'https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e', 'name': 'https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}, {'lang': 'en', 'value': 'CWE-416'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:46Z | 2022-02-16T11:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | pancake | 2022-02-13 21:27:58+01:00 | Prefer memleak over usaf in io.bank's rbtree bug ##crash
* That's a workaround, proper fix will come later
* Reproducer: bins/fuzzed/iobank-crash
* Reported by Akyne Choi via huntr.dev | b5cb90b28ec71fda3504da04e3cc94a362807f5e | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_io_bank_map_add_top | r_io_bank_map_add_top( RIO * io , const ut32 bankid , const ut32 mapid) | ['io', 'bankid', 'mapid'] | R_API bool r_io_bank_map_add_top(RIO *io, const ut32 bankid, const ut32 mapid) {
RIOBank *bank = r_io_bank_get (io, bankid);
RIOMap *map = r_io_map_get (io, mapid);
r_return_val_if_fail (io && bank && map, false);
RIOMapRef *mapref = _mapref_from_map (map);
if (!mapref) {
return false;
}
RIOSubMap *sm = r_io_submap_new (io, mapref);
if (!sm) {
free (mapref);
return false;
}
RRBNode *entry = _find_entry_submap_node (bank, sm);
if (!entry) {
// no intersection with any submap, so just insert
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
bank->last_used = NULL;
RIOSubMap *bd = (RIOSubMap *)entry->data;
if (r_io_submap_to (bd) == r_io_submap_to (sm) &&
r_io_submap_from (bd) >= r_io_submap_from (sm)) {
// _find_entry_submap_node guarantees, that there is no submap
// prior to bd in the range of sm, so instead of deleting and inserting
// we can just memcpy
memcpy (bd, sm, sizeof (RIOSubMap));
free (sm);
r_list_append (bank->maprefs, mapref);
return true;
}
if (r_io_submap_from (bd) < r_io_submap_from (sm) &&
r_io_submap_to (sm) < r_io_submap_to (bd)) {
// split bd into 2 maps => bd and bdsm
RIOSubMap *bdsm = R_NEWCOPY (RIOSubMap, bd);
if (!bdsm) {
free (sm);
free (mapref);
return false;
}
r_io_submap_set_from (bdsm, r_io_submap_to (sm) + 1);
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
// TODO: insert and check return value, before adjusting sm size
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (bdsm);
free (mapref);
return false;
}
if (!r_crbtree_insert (bank->submaps, bdsm, _find_sm_by_from_vaddr_cb, NULL)) {
r_crbtree_delete (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL);
free (sm);
free (bdsm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
}
// guaranteed intersection
if (r_io_submap_from (bd) < r_io_submap_from (sm)) {
r_io_submap_set_to (bd, r_io_submap_from (sm) - 1);
entry = r_rbnode_next (entry);
}
while (entry && r_io_submap_to (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
//delete all submaps that are completly included in sm
RRBNode *next = r_rbnode_next (entry);
// this can be optimized, there is no need to do search here
bool a = r_crbtree_delete (bank->submaps, entry->data, _find_sm_by_from_vaddr_cb, NULL);
if (!a) {
break;
}
entry = next;
}
if (entry && r_io_submap_from (((RIOSubMap *)entry->data)) <= r_io_submap_to (sm)) {
bd = (RIOSubMap *)entry->data;
r_io_submap_set_from (bd, r_io_submap_to (sm) + 1);
}
if (!r_crbtree_insert (bank->submaps, sm, _find_sm_by_from_vaddr_cb, NULL)) {
free (sm);
free (mapref);
return false;
}
r_list_append (bank->maprefs, mapref);
return true;
} | 588 | True | 1 |
CVE-2022-0559 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e', 'name': 'https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e', 'name': 'https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}, {'lang': 'en', 'value': 'CWE-416'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.2', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.'}] | 2022-04-08T13:46Z | 2022-02-16T11:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | pancake | 2022-02-13 21:27:58+01:00 | Prefer memleak over usaf in io.bank's rbtree bug ##crash
* That's a workaround, proper fix will come later
* Reproducer: bins/fuzzed/iobank-crash
* Reported by Akyne Choi via huntr.dev | b5cb90b28ec71fda3504da04e3cc94a362807f5e | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_crbtree_insert | r_crbtree_insert( RRBTree * tree , void * data , RRBComparator cmp , void * user) | ['tree', 'data', 'cmp', 'user'] | R_API bool r_crbtree_insert(RRBTree *tree, void *data, RRBComparator cmp, void *user) {
r_return_val_if_fail (tree && data && cmp, false);
bool inserted = false;
if (tree->root == NULL) {
tree->root = _node_new (data, NULL);
if (tree->root == NULL) {
return false;
}
inserted = true;
goto out_exit;
}
RRBNode head; /* Fake tree root */
memset (&head, 0, sizeof (RRBNode));
RRBNode *g = NULL, *parent = &head; /* Grandparent & parent */
RRBNode *p = NULL, *q = tree->root; /* Iterator & parent */
int dir = 0, last = 0; /* Directions */
_set_link (parent, q, 1);
for (;;) {
if (!q) {
/* Insert a node at first null link(also set its parent link) */
q = _node_new (data, p);
if (!q) {
return false;
}
p->link[dir] = q;
inserted = true;
} else if (IS_RED (q->link[0]) && IS_RED (q->link[1])) {
/* Simple red violation: color flip */
q->red = 1;
q->link[0]->red = 0;
q->link[1]->red = 0;
}
if (IS_RED (q) && IS_RED (p)) {
#if 0
// coverity error, parent is never null
/* Hard red violation: rotate */
if (!parent) {
return false;
}
#endif
int dir2 = parent->link[1] == g;
if (q == p->link[last]) {
_set_link (parent, _rot_once (g, !last), dir2);
} else {
_set_link (parent, _rot_twice (g, !last), dir2);
}
}
if (inserted) {
break;
}
last = dir;
dir = cmp (data, q->data, user) >= 0;
if (g) {
parent = g;
}
g = p;
p = q;
q = q->link[dir];
}
/* Update root(it may different due to root rotation) */
tree->root = head.link[1];
out_exit:
/* Invariant: root is black */
tree->root->red = 0;
tree->root->parent = NULL;
if (inserted) {
tree->size++;
}
return inserted;
} | 413 | True | 1 |
CVE-2022-0676 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'name': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'name': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:50Z | 2022-02-22T00:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | pancake | 2022-02-18 00:58:43+01:00 | Fix heap buffer overflow in dyldcache parser ##crash
* Reported by: Lazymio via huntr.dev
* Reproducer: dyldovf | c84b7232626badd075caf3ae29661b609164bac6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | create_cache_bins | create_cache_bins( RBinFile * bf , RDyldCache * cache) | ['bf', 'cache'] | static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) {
RList *bins = r_list_newf ((RListFree)free_bin);
if (!bins) {
return NULL;
}
char *target_libs = NULL;
RList *target_lib_names = NULL;
int *deps = NULL;
target_libs = r_sys_getenv ("R_DYLDCACHE_FILTER");
if (target_libs) {
target_lib_names = r_str_split_list (target_libs, ":", 0);
if (!target_lib_names) {
r_list_free (bins);
return NULL;
}
deps = R_NEWS0 (int, cache->hdr->imagesCount);
if (!deps) {
r_list_free (bins);
r_list_free (target_lib_names);
return NULL;
}
}
ut32 i;
for (i = 0; i < cache->n_hdr; i++) {
cache_hdr_t *hdr = &cache->hdr[i];
ut64 hdr_offset = cache->hdr_offset[i];
ut32 maps_index = cache->maps_index[i];
cache_img_t *img = read_cache_images (cache->buf, hdr, hdr_offset);
if (!img) {
goto next;
}
ut32 j;
ut16 *depArray = NULL;
cache_imgxtr_t *extras = NULL;
if (target_libs) {
HtPU *path_to_idx = NULL;
if (cache->accel) {
depArray = R_NEWS0 (ut16, cache->accel->depListCount);
if (!depArray) {
goto next;
}
if (r_buf_fread_at (cache->buf, cache->accel->depListOffset, (ut8*) depArray, "s", cache->accel->depListCount) != cache->accel->depListCount * 2) {
goto next;
}
extras = read_cache_imgextra (cache->buf, hdr, cache->accel);
if (!extras) {
goto next;
}
} else {
path_to_idx = create_path_to_index (cache->buf, img, hdr);
}
for (j = 0; j < hdr->imagesCount; j++) {
bool printing = !deps[j];
char *lib_name = get_lib_name (cache->buf, &img[j]);
if (!lib_name) {
break;
}
if (strstr (lib_name, "libobjc.A.dylib")) {
deps[j]++;
}
if (!r_list_find (target_lib_names, lib_name, string_contains)) {
R_FREE (lib_name);
continue;
}
if (printing) {
eprintf ("FILTER: %s\n", lib_name);
}
R_FREE (lib_name);
deps[j]++;
if (extras && depArray) {
ut32 k;
for (k = extras[j].dependentsStartArrayIndex; depArray[k] != 0xffff; k++) {
ut16 dep_index = depArray[k] & 0x7fff;
deps[dep_index]++;
char *dep_name = get_lib_name (cache->buf, &img[dep_index]);
if (!dep_name) {
break;
}
if (printing) {
eprintf ("-> %s\n", dep_name);
}
free (dep_name);
}
} else if (path_to_idx) {
carve_deps_at_address (cache, img, path_to_idx, img[j].address, deps, printing);
}
}
ht_pu_free (path_to_idx);
R_FREE (depArray);
R_FREE (extras);
}
for (j = 0; j < hdr->imagesCount; j++) {
if (deps && !deps[j]) {
continue;
}
ut64 pa = va2pa (img[j].address, hdr->mappingCount, &cache->maps[maps_index], cache->buf, 0, NULL, NULL);
if (pa == UT64_MAX) {
continue;
}
ut8 magicbytes[4];
r_buf_read_at (cache->buf, pa, magicbytes, 4);
int magic = r_read_le32 (magicbytes);
switch (magic) {
case MH_MAGIC_64:
{
char file[256];
RDyldBinImage *bin = R_NEW0 (RDyldBinImage);
if (!bin) {
goto next;
}
bin->header_at = pa;
bin->hdr_offset = hdr_offset;
bin->symbols_off = resolve_symbols_off (cache, pa);
bin->va = img[j].address;
if (r_buf_read_at (cache->buf, img[j].pathFileOffset, (ut8*) &file, sizeof (file)) == sizeof (file)) {
file[255] = 0;
char *last_slash = strrchr (file, '/');
if (last_slash && *last_slash) {
if (last_slash > file) {
char *scan = last_slash - 1;
while (scan > file && *scan != '/') {
scan--;
}
if (*scan == '/') {
bin->file = strdup (scan + 1);
} else {
bin->file = strdup (last_slash + 1);
}
} else {
bin->file = strdup (last_slash + 1);
}
} else {
bin->file = strdup (file);
}
}
r_list_append (bins, bin);
break;
}
default:
eprintf ("Unknown sub-bin\n");
break;
}
}
next:
R_FREE (depArray);
R_FREE (extras);
R_FREE (img);
}
if (r_list_empty (bins)) {
r_list_free (bins);
bins = NULL;
}
R_FREE (deps);
R_FREE (target_libs);
r_list_free (target_lib_names);
return bins;
} | 990 | True | 1 |
CVE-2022-0676 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'name': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'name': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:50Z | 2022-02-22T00:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | pancake | 2022-02-18 00:58:43+01:00 | Fix heap buffer overflow in dyldcache parser ##crash
* Reported by: Lazymio via huntr.dev
* Reproducer: dyldovf | c84b7232626badd075caf3ae29661b609164bac6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | load_buffer | load_buffer( RBinFile * bf , void ** bin_obj , RBuffer * buf , ut64 loadaddr , Sdb * sdb) | ['bf', 'bin_obj', 'buf', 'loadaddr', 'sdb'] | static bool load_buffer(RBinFile *bf, void **bin_obj, RBuffer *buf, ut64 loadaddr, Sdb *sdb) {
RDyldCache *cache = R_NEW0 (RDyldCache);
memcpy (cache->magic, "dyldcac", 7);
cache->buf = r_buf_ref (buf);
populate_cache_headers (cache);
if (!cache->hdr) {
r_dyldcache_free (cache);
return false;
}
populate_cache_maps (cache);
if (!cache->maps) {
r_dyldcache_free (cache);
return false;
}
cache->accel = read_cache_accel (cache->buf, cache->hdr, cache->maps);
cache->bins = create_cache_bins (bf, cache);
if (!cache->bins) {
r_dyldcache_free (cache);
return false;
}
cache->locsym = r_dyld_locsym_new (cache);
cache->rebase_infos = get_rebase_infos (bf, cache);
if (cache->rebase_infos) {
if (!rebase_infos_get_slide (cache)) {
if (!pending_bin_files) {
pending_bin_files = r_list_new ();
if (!pending_bin_files) {
r_dyldcache_free (cache);
return false;
}
}
r_list_push (pending_bin_files, bf);
swizzle_io_read (cache, bf->rbin->iob.io);
}
}
*bin_obj = cache;
return true;
} | 237 | True | 1 |
CVE-2022-0676 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'name': 'https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'name': 'https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:50Z | 2022-02-22T00:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | pancake | 2022-02-18 00:58:43+01:00 | Fix heap buffer overflow in dyldcache parser ##crash
* Reported by: Lazymio via huntr.dev
* Reproducer: dyldovf | c84b7232626badd075caf3ae29661b609164bac6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | read_cache_accel | read_cache_accel( RBuffer * cache_buf , cache_hdr_t * hdr , cache_map_t * maps) | ['cache_buf', 'hdr', 'maps'] | static cache_accel_t *read_cache_accel(RBuffer *cache_buf, cache_hdr_t *hdr, cache_map_t *maps) {
if (!cache_buf || !hdr || !hdr->accelerateInfoSize || !hdr->accelerateInfoAddr) {
return NULL;
}
ut64 offset = va2pa (hdr->accelerateInfoAddr, hdr->mappingCount, maps, cache_buf, 0, NULL, NULL);
if (!offset) {
return NULL;
}
ut64 size = sizeof (cache_accel_t);
cache_accel_t *accel = R_NEW0 (cache_accel_t);
if (!accel) {
return NULL;
}
if (r_buf_fread_at (cache_buf, offset, (ut8*) accel, "16il", 1) != size) {
R_FREE (accel);
return NULL;
}
accel->imagesExtrasOffset += offset;
accel->bottomUpListOffset += offset;
accel->dylibTrieOffset += offset;
accel->initializersOffset += offset;
accel->dofSectionsOffset += offset;
accel->reExportListOffset += offset;
accel->depListOffset += offset;
accel->rangeTableOffset += offset;
return accel;
} | 182 | True | 1 |
CVE-2022-0476 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b', 'name': 'https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d', 'name': 'https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-23T17:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-21 18:01:56+01:00 | Fix DoS in the minidump parser ##crash
* Reported by lazymio via huntr.dev
* Reproducer: mdmp-dos | 27fe8031782d3a06c3998eaa94354867864f9f1b | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_mdmp_init_directory_entry | r_bin_mdmp_init_directory_entry( struct r_bin_mdmp_obj * obj , struct minidump_directory * entry) | ['obj', 'entry'] | static bool r_bin_mdmp_init_directory_entry(struct r_bin_mdmp_obj *obj, struct minidump_directory *entry) {
r_strf_buffer (128);
struct minidump_handle_operation_list handle_operation_list;
struct minidump_memory_list memory_list;
struct minidump_memory64_list memory64_list;
struct minidump_memory_info_list memory_info_list;
struct minidump_module_list module_list;
struct minidump_thread_list thread_list;
struct minidump_thread_ex_list thread_ex_list;
struct minidump_thread_info_list thread_info_list;
struct minidump_token_info_list token_info_list;
struct minidump_unloaded_module_list unloaded_module_list;
ut64 offset;
int i, r;
/* We could confirm data sizes but a malcious MDMP will always get around
** this! But we can ensure that the data is not outside of the file */
if ((ut64)entry->location.rva + entry->location.data_size > r_buf_size (obj->b)) {
eprintf ("[ERROR] Size Mismatch - Stream data is larger than file size!\n");
return false;
}
switch (entry->stream_type) {
case THREAD_LIST_STREAM:
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&thread_list, sizeof (thread_list));
if (r != sizeof (thread_list)) {
break;
}
sdb_set (obj->kv, "mdmp_thread.format", "ddddq?? "
"ThreadId SuspendCount PriorityClass Priority "
"Teb (mdmp_memory_descriptor)Stack "
"(mdmp_location_descriptor)ThreadContext", 0);
sdb_num_set (obj->kv, "mdmp_thread_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_thread_list.format",
r_strf ("d[%d]? "
"NumberOfThreads (mdmp_thread)Threads",
thread_list.number_of_threads),
0);
/* TODO: Not yet fully parsed or utilised */
break;
case MODULE_LIST_STREAM:
module_list.number_of_modules = r_buf_read_le32_at (obj->b, entry->location.rva);
sdb_set (obj->kv, "mdmp_module.format", "qddtd???qq "
"BaseOfImage SizeOfImage CheckSum "
"TimeDateStamp ModuleNameRVA "
"(mdmp_vs_fixedfileinfo)VersionInfo "
"(mdmp_location_descriptor)CvRecord "
"(mdmp_location_descriptor)MiscRecord "
"Reserved0 Reserved1", 0);
sdb_num_set (obj->kv, "mdmp_module_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_module_list.format",
r_strf ("d[%d]? "
"NumberOfModule (mdmp_module)Modules",
module_list.number_of_modules),
0);
offset = entry->location.rva + sizeof (module_list);
for (i = 0; i < module_list.number_of_modules; i++) {
struct minidump_module *module = R_NEW (struct minidump_module);
if (!module) {
break;
}
read_module (obj->b, offset, module);
r_list_append (obj->streams.modules, module);
offset += sizeof (*module);
}
break;
case MEMORY_LIST_STREAM:
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&memory_list, sizeof (memory_list));
if (r != sizeof (memory_list)) {
break;
}
sdb_num_set (obj->kv, "mdmp_memory_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_memory_list.format",
r_strf ("d[%d]? "
"NumberOfMemoryRanges "
"(mdmp_memory_descriptor)MemoryRanges ",
memory_list.number_of_memory_ranges),
0);
offset = entry->location.rva + sizeof (memory_list);
for (i = 0; i < memory_list.number_of_memory_ranges; i++) {
struct minidump_memory_descriptor *desc = R_NEW (struct minidump_memory_descriptor);
if (!desc) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)desc, sizeof (*desc));
if (r != sizeof (*desc)) {
break;
}
r_list_append (obj->streams.memories, desc);
offset += sizeof (*desc);
}
break;
case EXCEPTION_STREAM:
/* TODO: Not yet fully parsed or utilised */
obj->streams.exception = R_NEW (struct minidump_exception_stream);
if (!obj->streams.exception) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)obj->streams.exception, sizeof (*obj->streams.exception));
if (r != sizeof (*obj->streams.exception)) {
break;
}
sdb_set (obj->kv, "mdmp_exception.format", "[4]E[4]Eqqdd[15]q "
"(mdmp_exception_code)ExceptionCode "
"(mdmp_exception_flags)ExceptionFlags "
"ExceptionRecord ExceptionAddress "
"NumberParameters __UnusedAlignment "
"ExceptionInformation",
0);
sdb_num_set (obj->kv, "mdmp_exception_stream.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_exception_stream.format", "dd?? "
"ThreadId __Alignment "
"(mdmp_exception)ExceptionRecord "
"(mdmp_location_descriptor)ThreadContext",
0);
break;
case SYSTEM_INFO_STREAM:
obj->streams.system_info = R_NEW (struct minidump_system_info);
if (!obj->streams.system_info) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)obj->streams.system_info, sizeof (*obj->streams.system_info));
if (r != sizeof (*obj->streams.system_info)) {
break;
}
sdb_num_set (obj->kv, "mdmp_system_info.offset",
entry->location.rva, 0);
/* TODO: We need E as a byte! */
sdb_set (obj->kv, "mdmp_system_info.format", "[2]EwwbBddd[4]Ed[2]Ew[2]q "
"(mdmp_processor_architecture)ProcessorArchitecture "
"ProcessorLevel ProcessorRevision NumberOfProcessors "
"(mdmp_product_type)ProductType "
"MajorVersion MinorVersion BuildNumber (mdmp_platform_id)PlatformId "
"CsdVersionRva (mdmp_suite_mask)SuiteMask Reserved2 ProcessorFeatures", 0);
break;
case THREAD_EX_LIST_STREAM:
/* TODO: Not yet fully parsed or utilised */
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&thread_ex_list, sizeof (thread_ex_list));
if (r != sizeof (thread_ex_list)) {
break;
}
sdb_set (obj->kv, "mdmp_thread_ex.format", "ddddq??? "
"ThreadId SuspendCount PriorityClass Priority "
"Teb (mdmp_memory_descriptor)Stack "
"(mdmp_location_descriptor)ThreadContext "
"(mdmp_memory_descriptor)BackingStore", 0);
sdb_num_set (obj->kv, "mdmp_thread_ex_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_thread_ex_list.format",
r_strf ("d[%d]? NumberOfThreads "
"(mdmp_thread_ex)Threads",
thread_ex_list.number_of_threads),
0);
offset = entry->location.rva + sizeof (thread_ex_list);
for (i = 0; i < thread_ex_list.number_of_threads; i++) {
struct minidump_thread_ex *thread = R_NEW (struct minidump_thread_ex);
if (!thread) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)thread, sizeof (*thread));
if (r != sizeof (*thread)) {
break;
}
r_list_append (obj->streams.ex_threads, thread);
offset += sizeof (*thread);
}
break;
case MEMORY_64_LIST_STREAM:
read_memory64_list (obj->b, entry->location.rva, &memory64_list);
sdb_num_set (obj->kv, "mdmp_memory64_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_memory64_list.format",
r_strf ("qq[%"PFMT64d"]? NumberOfMemoryRanges "
"BaseRva "
"(mdmp_memory_descriptor64)MemoryRanges",
memory64_list.number_of_memory_ranges),
0);
obj->streams.memories64.base_rva = memory64_list.base_rva;
offset = entry->location.rva + sizeof (memory64_list);
for (i = 0; i < memory64_list.number_of_memory_ranges; i++) {
struct minidump_memory_descriptor64 *desc = R_NEW (struct minidump_memory_descriptor64);
if (!desc) {
break;
}
read_desc (obj->b, offset, desc);
r_list_append (obj->streams.memories64.memories, desc);
offset += sizeof (*desc);
}
break;
case COMMENT_STREAM_A:
/* TODO: Not yet fully parsed or utilised */
obj->streams.comments_a = R_NEWS (ut8, COMMENTS_SIZE);
if (!obj->streams.comments_a) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, obj->streams.comments_a, COMMENTS_SIZE);
if (r != COMMENTS_SIZE) {
break;
}
sdb_num_set (obj->kv, "mdmp_comment_stream_a.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_comment_stream_a.format",
"s CommentA", 0);
break;
case COMMENT_STREAM_W:
/* TODO: Not yet fully parsed or utilised */
obj->streams.comments_w = R_NEWS (ut8, COMMENTS_SIZE);
if (!obj->streams.comments_w) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, obj->streams.comments_w, COMMENTS_SIZE);
if (r != COMMENTS_SIZE) {
break;
}
sdb_num_set (obj->kv, "mdmp_comment_stream_w.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_comment_stream_w.format",
"s CommentW", 0);
break;
case HANDLE_DATA_STREAM:
/* TODO: Not yet fully parsed or utilised */
obj->streams.handle_data = R_NEW (struct minidump_handle_data_stream);
if (!obj->streams.handle_data) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)obj->streams.handle_data, sizeof (*obj->streams.handle_data));
if (r != sizeof (*obj->streams.handle_data)) {
break;
}
sdb_num_set (obj->kv, "mdmp_handle_data_stream.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_handle_data_stream.format", "dddd "
"SizeOfHeader SizeOfDescriptor "
"NumberOfDescriptors Reserved", 0);
break;
case FUNCTION_TABLE_STREAM:
/* TODO: Not yet fully parsed or utilised */
obj->streams.function_table = R_NEW (struct minidump_function_table_stream);
if (!obj->streams.function_table) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)obj->streams.function_table, sizeof (*obj->streams.function_table));
if (r != sizeof (*obj->streams.function_table)) {
break;
}
sdb_num_set (obj->kv, "mdmp_function_table_stream.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_function_table_stream.format", "dddddd "
"SizeOfHeader SizeOfDescriptor SizeOfNativeDescriptor "
"SizeOfFunctionEntry NumberOfDescriptors SizeOfAlignPad",
0);
break;
case UNLOADED_MODULE_LIST_STREAM:
/* TODO: Not yet fully parsed or utilised */
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&unloaded_module_list, sizeof (unloaded_module_list));
if (r != sizeof (unloaded_module_list)) {
break;
}
sdb_set (obj->kv, "mdmp_unloaded_module.format", "qddtd "
"BaseOfImage SizeOfImage CheckSum TimeDateStamp "
"ModuleNameRva", 0);
sdb_num_set (obj->kv, "mdmp_unloaded_module_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_unloaded_module_list.format", "ddd "
"SizeOfHeader SizeOfEntry NumberOfEntries", 0);
offset = entry->location.rva + sizeof (unloaded_module_list);
for (i = 0; i < unloaded_module_list.number_of_entries; i++) {
struct minidump_unloaded_module *module = R_NEW (struct minidump_unloaded_module);
if (!module) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)module, sizeof (*module));
if (r != sizeof (*module)) {
break;
}
r_list_append (obj->streams.unloaded_modules, module);
offset += sizeof (*module);
}
break;
case MISC_INFO_STREAM:
/* TODO: Not yet fully parsed or utilised */
obj->streams.misc_info.misc_info_1 = R_NEW (struct minidump_misc_info);
if (!obj->streams.misc_info.misc_info_1) {
break;
}
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)obj->streams.misc_info.misc_info_1, sizeof (*obj->streams.misc_info.misc_info_1));
if (r != sizeof (*obj->streams.misc_info.misc_info_1)) {
break;
}
/* TODO: Handle different sizes */
sdb_num_set (obj->kv, "mdmp_misc_info.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_misc_info.format", "d[4]Bdtttddddd "
"SizeOfInfo (mdmp_misc1_flags)Flags1 ProcessId "
"ProcessCreateTime ProcessUserTime ProcessKernelTime "
"ProcessorMaxMhz ProcessorCurrentMhz "
"ProcessorMhzLimit ProcessorMaxIdleState "
"ProcessorCurrentIdleState", 0);
break;
case MEMORY_INFO_LIST_STREAM:
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&memory_info_list, sizeof (memory_info_list));
if (r != sizeof (memory_info_list)) {
break;
}
sdb_set (obj->kv, "mdmp_memory_info.format",
"qq[4]Edq[4]E[4]E[4]Ed BaseAddress AllocationBase "
"(mdmp_page_protect)AllocationProtect __Alignment1 RegionSize "
"(mdmp_mem_state)State (mdmp_page_protect)Protect "
"(mdmp_mem_type)Type __Alignment2", 0);
sdb_num_set (obj->kv, "mdmp_memory_info_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_memory_info_list.format",
r_strf ("ddq[%"PFMT64d"]? SizeOfHeader SizeOfEntry "
"NumberOfEntries (mdmp_memory_info)MemoryInfo",
memory_info_list.number_of_entries),
0);
offset = entry->location.rva + sizeof (memory_info_list);
for (i = 0; i < memory_info_list.number_of_entries; i++) {
struct minidump_memory_info *info = R_NEW (struct minidump_memory_info);
if (!info) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)info, sizeof (*info));
if (r != sizeof (*info)) {
break;
}
r_list_append (obj->streams.memory_infos, info);
offset += sizeof (*info);
}
break;
case THREAD_INFO_LIST_STREAM:
/* TODO: Not yet fully parsed or utilised */
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&thread_info_list, sizeof (thread_info_list));
if (r != sizeof (thread_info_list)) {
break;
}
sdb_set (obj->kv, "mdmp_thread_info.format", "ddddttttqq "
"ThreadId DumpFlags DumpError ExitStatus CreateTime "
"ExitTime KernelTime UserTime StartAddress Affinity",
0);
sdb_num_set (obj->kv, "mdmp_thread_info_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_thread_info_list.format", "ddd "
"SizeOfHeader SizeOfEntry NumberOfEntries", 0);
offset = entry->location.rva + sizeof (thread_info_list);
for (i = 0; i < thread_info_list.number_of_entries; i++) {
struct minidump_thread_info *info = R_NEW (struct minidump_thread_info);
if (!info) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)info, sizeof (*info));
if (r != sizeof (*info)) {
break;
}
r_list_append (obj->streams.thread_infos, info);
offset += sizeof (*info);
}
break;
case HANDLE_OPERATION_LIST_STREAM:
/* TODO: Not yet fully parsed or utilised */
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&handle_operation_list, sizeof (handle_operation_list));
if (r != sizeof (handle_operation_list)) {
break;
}
sdb_num_set (obj->kv, "mdmp_handle_operation_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_handle_operation_list.format", "dddd "
"SizeOfHeader SizeOfEntry NumberOfEntries Reserved", 0);
offset = entry->location.rva + sizeof (handle_operation_list);
for (i = 0; i < handle_operation_list.number_of_entries; i++) {
struct avrf_handle_operation *op = R_NEW (struct avrf_handle_operation);
if (!op) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)op, sizeof (*op));
if (r != sizeof (*op)) {
break;
}
r_list_append (obj->streams.operations, op);
offset += sizeof (*op);
}
break;
case TOKEN_STREAM:
/* TODO: Not fully parsed or utilised */
r = r_buf_read_at (obj->b, entry->location.rva, (ut8 *)&token_info_list, sizeof (token_info_list));
if (r != sizeof (token_info_list)) {
break;
}
sdb_set (obj->kv, "mdmp_token_info.format", "ddq "
"TokenSize TokenId TokenHandle", 0);
sdb_num_set (obj->kv, "mdmp_token_info_list.offset",
entry->location.rva, 0);
sdb_set (obj->kv, "mdmp_token_info_list.format", "dddd "
"TokenListSize TokenListEntries ListHeaderSize ElementHeaderSize", 0);
offset = entry->location.rva + sizeof (token_info_list);
for (i = 0; i < token_info_list.number_of_entries; i++) {
struct minidump_token_info *info = R_NEW (struct minidump_token_info);
if (!info) {
break;
}
r = r_buf_read_at (obj->b, offset, (ut8 *)info, sizeof (*info));
if (r != sizeof (*info)) {
break;
}
r_list_append (obj->streams.token_infos, info);
offset += sizeof (*info);
}
break;
case LAST_RESERVED_STREAM:
/* TODO: Not yet fully parsed or utilised */
break;
case UNUSED_STREAM:
case RESERVED_STREAM_0:
case RESERVED_STREAM_1:
/* Silently ignore reserved streams */
break;
default:
eprintf ("[WARN] Invalid or unsupported enumeration encountered %d\n", entry->stream_type);
break;
}
return true;
} | 2728 | True | 1 |
CVE-2022-0476 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b', 'name': 'https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d', 'name': 'https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-23T17:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-21 18:01:56+01:00 | Fix DoS in the minidump parser ##crash
* Reported by lazymio via huntr.dev
* Reproducer: mdmp-dos | 27fe8031782d3a06c3998eaa94354867864f9f1b | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | read_module | read_module( RBuffer * b , ut64 addr , struct minidump_module * module) | ['b', 'addr', 'module'] | static void read_module(RBuffer *b, ut64 addr, struct minidump_module *module) {
st64 o_addr = r_buf_seek (b, 0, R_BUF_CUR);
r_buf_seek (b, addr, R_BUF_SET);
module->base_of_image = r_buf_read_le64 (b);
module->size_of_image = r_buf_read_le32 (b);
module->check_sum = r_buf_read_le32 (b);
module->time_date_stamp = r_buf_read_le32 (b);
module->module_name_rva = r_buf_read_le32 (b);
module->version_info.dw_signature = r_buf_read_le32 (b);
module->version_info.dw_struc_version = r_buf_read_le32 (b);
module->version_info.dw_file_version_ms = r_buf_read_le32 (b);
module->version_info.dw_file_version_ls = r_buf_read_le32 (b);
module->version_info.dw_product_version_ms = r_buf_read_le32 (b);
module->version_info.dw_product_version_ls = r_buf_read_le32 (b);
module->version_info.dw_file_flags_mask = r_buf_read_le32 (b);
module->version_info.dw_file_flags = r_buf_read_le32 (b);
module->version_info.dw_file_os = r_buf_read_le32 (b);
module->version_info.dw_file_type = r_buf_read_le32 (b);
module->version_info.dw_file_subtype = r_buf_read_le32 (b);
module->version_info.dw_file_date_ms = r_buf_read_le32 (b);
module->version_info.dw_file_date_ls = r_buf_read_le32 (b);
module->cv_record.data_size = r_buf_read_le32 (b);
module->cv_record.rva = r_buf_read_le32 (b);
module->misc_record.data_size = r_buf_read_le32 (b);
module->misc_record.rva = r_buf_read_le32 (b);
module->reserved_0 = r_buf_read_le64 (b);
module->reserved_1 = r_buf_read_le64 (b);
r_buf_seek (b, o_addr, R_BUF_SET);
} | 296 | True | 1 |
CVE-2022-0713 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:P | NETWORK | MEDIUM | NONE | PARTIAL | NONE | PARTIAL | 5.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | NONE | HIGH | 7.1 | HIGH | 1.8 | 5.2 | False | [{'url': 'https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c', 'name': 'https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1', 'name': 'https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:55Z | 2022-02-22T19:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | pancake | 2022-02-21 19:25:02+01:00 | Fix oobread in macho core symbolication ##crash
* Reported by @cnitlrt via huntr.dev | a35f89f86ed12161af09330e92e5a213014e46a1 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_coresym_cache_element_new | r_coresym_cache_element_new( RBinFile * bf , RBuffer * buf , ut64 off , int bits , char * file_name) | ['bf', 'buf', 'off', 'bits', 'file_name'] | RCoreSymCacheElement *r_coresym_cache_element_new(RBinFile *bf, RBuffer *buf, ut64 off, int bits, char * file_name) {
RCoreSymCacheElement *result = NULL;
ut8 *b = NULL;
RCoreSymCacheElementHdr *hdr = r_coresym_cache_element_header_new (buf, off, bits);
if (!hdr) {
return NULL;
}
if (hdr->version != 1) {
eprintf ("Unsupported CoreSymbolication cache version (%d)\n", hdr->version);
goto beach;
}
if (hdr->size == 0 || hdr->size > r_buf_size (buf) - off) {
eprintf ("Corrupted CoreSymbolication header: size out of bounds (0x%x)\n", hdr->size);
goto beach;
}
result = R_NEW0 (RCoreSymCacheElement);
if (!result) {
goto beach;
}
result->hdr = hdr;
b = malloc (hdr->size);
if (!b) {
goto beach;
}
if (r_buf_read_at (buf, off, b, hdr->size) != hdr->size) {
goto beach;
}
ut8 *end = b + hdr->size;
if (file_name) {
result->file_name = file_name;
} else if (hdr->file_name_off) {
result->file_name = str_dup_safe (b, b + (size_t)hdr->file_name_off, end);
}
if (hdr->version_off) {
result->binary_version = str_dup_safe (b, b + (size_t)hdr->version_off, end);
}
const size_t word_size = bits / 8;
const ut64 start_of_sections = (ut64)hdr->n_segments * R_CS_EL_SIZE_SEG + R_CS_EL_OFF_SEGS;
const ut64 sect_size = (bits == 32) ? R_CS_EL_SIZE_SECT_32 : R_CS_EL_SIZE_SECT_64;
const ut64 start_of_symbols = start_of_sections + (ut64)hdr->n_sections * sect_size;
const ut64 start_of_lined_symbols = start_of_symbols + (ut64)hdr->n_symbols * R_CS_EL_SIZE_SYM;
const ut64 start_of_line_info = start_of_lined_symbols + (ut64)hdr->n_lined_symbols * R_CS_EL_SIZE_LSYM;
const ut64 start_of_unknown_pairs = start_of_line_info + (ut64)hdr->n_line_info * R_CS_EL_SIZE_LINFO;
const ut64 start_of_strings = start_of_unknown_pairs + (ut64)hdr->n_symbols * 8;
ut64 page_zero_size = 0;
size_t page_zero_idx = 0;
if (UT32_MUL_OVFCHK (hdr->n_segments, sizeof (RCoreSymCacheElementSegment))) {
goto beach;
} else if (UT32_MUL_OVFCHK (hdr->n_sections, sizeof (RCoreSymCacheElementSection))) {
goto beach;
} else if (UT32_MUL_OVFCHK (hdr->n_symbols, sizeof (RCoreSymCacheElementSymbol))) {
goto beach;
} else if (UT32_MUL_OVFCHK (hdr->n_lined_symbols, sizeof (RCoreSymCacheElementLinedSymbol))) {
goto beach;
} else if (UT32_MUL_OVFCHK (hdr->n_line_info, sizeof (RCoreSymCacheElementLineInfo))) {
goto beach;
}
if (hdr->n_segments > 0) {
result->segments = R_NEWS0 (RCoreSymCacheElementSegment, hdr->n_segments);
if (!result->segments) {
goto beach;
}
size_t i;
ut8 *cursor = b + R_CS_EL_OFF_SEGS;
for (i = 0; i < hdr->n_segments && cursor < end; i++) {
RCoreSymCacheElementSegment *seg = &result->segments[i];
seg->paddr = seg->vaddr = r_read_le64 (cursor);
cursor += 8;
if (cursor >= end) {
break;
}
seg->size = seg->vsize = r_read_le64 (cursor);
cursor += 8;
if (cursor >= end) {
break;
}
seg->name = str_dup_safe_fixed (b, cursor, 16, end);
cursor += 16;
if (!seg->name) {
continue;
}
if (!strcmp (seg->name, "__PAGEZERO")) {
page_zero_size = seg->size;
page_zero_idx = i;
seg->paddr = seg->vaddr = 0;
seg->size = 0;
}
}
for (i = 0; i < hdr->n_segments && page_zero_size > 0; i++) {
if (i == page_zero_idx) {
continue;
}
RCoreSymCacheElementSegment *seg = &result->segments[i];
if (seg->vaddr < page_zero_size) {
seg->vaddr += page_zero_size;
}
}
}
bool relative_to_strings = false;
ut8* string_origin;
if (hdr->n_sections > 0) {
result->sections = R_NEWS0 (RCoreSymCacheElementSection, hdr->n_sections);
if (!result->sections) {
goto beach;
}
size_t i;
ut8 *cursor = b + start_of_sections;
for (i = 0; i < hdr->n_sections && cursor < end; i++) {
ut8 *sect_start = cursor;
RCoreSymCacheElementSection *sect = &result->sections[i];
sect->vaddr = sect->paddr = r_read_ble (cursor, false, bits);
if (sect->vaddr < page_zero_size) {
sect->vaddr += page_zero_size;
}
cursor += word_size;
if (cursor >= end) {
break;
}
sect->size = r_read_ble (cursor, false, bits);
cursor += word_size;
if (cursor >= end) {
break;
}
ut64 sect_name_off = r_read_ble (cursor, false, bits);
if (!i && !sect_name_off) {
relative_to_strings = true;
}
cursor += word_size;
if (bits == 32) {
cursor += word_size;
}
string_origin = relative_to_strings? b + start_of_strings : sect_start;
sect->name = str_dup_safe (b, string_origin + (size_t)sect_name_off, end);
}
}
if (hdr->n_symbols) {
result->symbols = R_NEWS0 (RCoreSymCacheElementSymbol, hdr->n_symbols);
if (!result->symbols) {
goto beach;
}
size_t i;
ut8 *cursor = b + start_of_symbols;
for (i = 0; i < hdr->n_symbols && cursor + R_CS_EL_SIZE_SYM <= end; i++) {
RCoreSymCacheElementSymbol *sym = &result->symbols[i];
sym->paddr = r_read_le32 (cursor);
sym->size = r_read_le32 (cursor + 0x4);
sym->unk1 = r_read_le32 (cursor + 0x8);
size_t name_off = r_read_le32 (cursor + 0xc);
size_t mangled_name_off = r_read_le32 (cursor + 0x10);
sym->unk2 = (st32)r_read_le32 (cursor + 0x14);
string_origin = relative_to_strings? b + start_of_strings : cursor;
sym->name = str_dup_safe (b, string_origin + name_off, end);
if (!sym->name) {
cursor += R_CS_EL_SIZE_SYM;
continue;
}
string_origin = relative_to_strings? b + start_of_strings : cursor;
sym->mangled_name = str_dup_safe (b, string_origin + mangled_name_off, end);
if (!sym->mangled_name) {
cursor += R_CS_EL_SIZE_SYM;
continue;
}
cursor += R_CS_EL_SIZE_SYM;
}
}
if (hdr->n_lined_symbols) {
result->lined_symbols = R_NEWS0 (RCoreSymCacheElementLinedSymbol, hdr->n_lined_symbols);
if (!result->lined_symbols) {
goto beach;
}
size_t i;
ut8 *cursor = b + start_of_lined_symbols;
for (i = 0; i < hdr->n_lined_symbols && cursor + R_CS_EL_SIZE_LSYM <= end; i++) {
RCoreSymCacheElementLinedSymbol *lsym = &result->lined_symbols[i];
lsym->sym.paddr = r_read_le32 (cursor);
lsym->sym.size = r_read_le32 (cursor + 0x4);
lsym->sym.unk1 = r_read_le32 (cursor + 0x8);
size_t name_off = r_read_le32 (cursor + 0xc);
size_t mangled_name_off = r_read_le32 (cursor + 0x10);
lsym->sym.unk2 = (st32)r_read_le32 (cursor + 0x14);
size_t file_name_off = r_read_le32 (cursor + 0x18);
lsym->flc.line = r_read_le32 (cursor + 0x1c);
lsym->flc.col = r_read_le32 (cursor + 0x20);
string_origin = relative_to_strings? b + start_of_strings : cursor;
lsym->sym.name = str_dup_safe (b, string_origin + name_off, end);
if (!lsym->sym.name) {
cursor += R_CS_EL_SIZE_LSYM;
continue;
}
string_origin = relative_to_strings? b + start_of_strings : cursor;
lsym->sym.mangled_name = str_dup_safe (b, string_origin + mangled_name_off, end);
if (!lsym->sym.mangled_name) {
cursor += R_CS_EL_SIZE_LSYM;
continue;
}
string_origin = relative_to_strings? b + start_of_strings : cursor;
lsym->flc.file = str_dup_safe (b, string_origin + file_name_off, end);
if (!lsym->flc.file) {
cursor += R_CS_EL_SIZE_LSYM;
continue;
}
cursor += R_CS_EL_SIZE_LSYM;
meta_add_fileline (bf, r_coresym_cache_element_pa2va (result, lsym->sym.paddr), lsym->sym.size, &lsym->flc);
}
}
if (hdr->n_line_info) {
result->line_info = R_NEWS0 (RCoreSymCacheElementLineInfo, hdr->n_line_info);
if (!result->line_info) {
goto beach;
}
size_t i;
ut8 *cursor = b + start_of_line_info;
for (i = 0; i < hdr->n_line_info && cursor + R_CS_EL_SIZE_LINFO <= end; i++) {
RCoreSymCacheElementLineInfo *info = &result->line_info[i];
info->paddr = r_read_le32 (cursor);
info->size = r_read_le32 (cursor + 4);
size_t file_name_off = r_read_le32 (cursor + 8);
info->flc.line = r_read_le32 (cursor + 0xc);
info->flc.col = r_read_le32 (cursor + 0x10);
string_origin = relative_to_strings? b + start_of_strings : cursor;
info->flc.file = str_dup_safe (b, string_origin + file_name_off, end);
if (!info->flc.file) {
break;
}
cursor += R_CS_EL_SIZE_LINFO;
meta_add_fileline (bf, r_coresym_cache_element_pa2va (result, info->paddr), info->size, &info->flc);
}
}
/*
* TODO:
* Figure out the meaning of the 2 arrays of hdr->n_symbols
* 32-bit integers located at the end of line info.
* Those are the last info before the strings at the end.
*/
beach:
free (b);
return result;
} | 1769 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | PE_( check_mingw) | PE_( check_mingw)( RBinPEObj * pe) | ['pe'] | struct r_bin_pe_addr_t *PE_(check_mingw)(RBinPEObj *pe) {
struct r_bin_pe_addr_t* entry;
bool sw = false;
ut8 b[1024];
size_t n = 0;
if (!pe || !pe->b) {
return 0LL;
}
entry = PE_(r_bin_pe_get_entrypoint) (pe);
ZERO_FILL (b);
if (r_buf_read_at (pe->b, entry->paddr, b, sizeof (b)) < 0) {
pe_printf ("Warning: Cannot read entry at 0x%08"PFMT64x "\n", entry->paddr);
free (entry);
return NULL;
}
// mingw
//55 push ebp
//89 E5 mov ebp, esp
//83 EC 08 sub esp, 8
//C7 04 24 01 00 00 00 mov dword ptr[esp], 1
//FF 15 C8 63 41 00 call ds : __imp____set_app_type
//E8 B8 FE FF FF call ___mingw_CRTStartup
if (b[0] == 0x55 && b[1] == 0x89 && b[3] == 0x83 && b[6] == 0xc7 && b[13] == 0xff && b[19] == 0xe8) {
sw = follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, 19);
}
//83 EC 1C sub esp, 1Ch
//C7 04 24 01 00 00 00 mov[esp + 1Ch + var_1C], 1
//FF 15 F8 60 40 00 call ds : __imp____set_app_type
//E8 6B FD FF FF call ___mingw_CRTStartup
if (b[0] == 0x83 && b[3] == 0xc7 && b[10] == 0xff && b[16] == 0xe8) {
sw = follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, 16);
}
//83 EC 0C sub esp, 0Ch
//C7 05 F4 0A 81 00 00 00 00 00 mov ds : _mingw_app_type, 0
//ED E8 3E AD 24 00 call ___security_init_cookie
//F2 83 C4 0C add esp, 0Ch
//F5 E9 86 FC FF FF jmp ___tmainCRTStartup
if (b[0] == 0x83 && b[3] == 0xc7 && b[13] == 0xe8 && b[18] == 0x83 && b[21] == 0xe9) {
sw = follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, 21);
}
if (sw) {
// case1:
// from des address of call search for a1 xx xx xx xx 89 xx xx e8 xx xx xx xx
//A1 04 50 44 00 mov eax, ds:dword_445004
//89 04 24 mov[esp + 28h + lpTopLevelExceptionFilter], eax
//E8 A3 01 00 00 call sub_4013EE
for (n = 0; n < sizeof (b) - 12; n++) {
if (b[n] == 0xa1 && b[n + 5] == 0x89 && b[n + 8] == 0xe8) {
sw = follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, n + 8);
return entry;
}
}
}
free (entry);
return NULL;
} | 382 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | PE_( check_unknow) | PE_( check_unknow)( RBinPEObj * pe) | ['pe'] | struct r_bin_pe_addr_t *PE_(check_unknow)(RBinPEObj *pe) {
struct r_bin_pe_addr_t *entry;
if (!pe || !pe->b) {
return 0LL;
}
ut8 b[512];
ZERO_FILL (b);
entry = PE_ (r_bin_pe_get_entrypoint) (pe);
// option2: /x 8bff558bec83ec20
if (r_buf_read_at (pe->b, entry->paddr, b, 512) < 1) {
pe_printf ("Warning: Cannot read entry at 0x%08"PFMT64x"\n", entry->paddr);
free (entry);
return NULL;
}
/* Decode the jmp instruction, this gets the address of the 'main'
function for PE produced by a compiler whose name someone forgot to
write down. */
// this is dirty only a single byte check, can return false positives
if (b[367] == 0xe8) {
follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, 367);
return entry;
}
size_t i;
for (i = 0; i < 512 - 16 ; i++) {
// 5. ff 15 .. .. .. .. 50 e8 [main]
if (!memcmp (b + i, "\xff\x15", 2)) {
if (b[i + 6] == 0x50) {
if (b[i + 7] == 0xe8) {
follow_offset (entry, pe->b, b, sizeof (b), pe->big_endian, i + 7);
return entry;
}
}
}
}
free (entry);
return NULL;
} | 221 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | Pe_r_bin_pe_parse_var | Pe_r_bin_pe_parse_var( RBinPEObj * pe , PE_DWord * curAddr) | ['pe', 'curAddr'] | static Var* Pe_r_bin_pe_parse_var(RBinPEObj* pe, PE_DWord* curAddr) {
Var* var = calloc (1, sizeof (*var));
if (!var) {
pe_printf ("Warning: calloc (Var)\n");
return NULL;
}
if ((var->wLength = r_buf_read_le16_at (pe->b, *curAddr)) == UT16_MAX) {
pe_printf ("Warning: read (Var wLength)\n");
free_Var (var);
return NULL;
}
*curAddr += sizeof (var->wLength);
if ((var->wValueLength = r_buf_read_le16_at (pe->b, *curAddr)) == UT16_MAX) {
pe_printf ("Warning: read (Var wValueLength)\n");
free_Var (var);
return NULL;
}
*curAddr += sizeof (var->wValueLength);
if ((var->wType = r_buf_read_le16_at (pe->b, *curAddr)) == UT16_MAX) {
pe_printf ("Warning: read (Var wType)\n");
free_Var (var);
return NULL;
}
*curAddr += sizeof (var->wType);
if (var->wType != 0 && var->wType != 1) {
pe_printf ("Warning: check (Var wType)\n");
free_Var (var);
return NULL;
}
var->szKey = (ut16*) malloc (UT16_ALIGN (TRANSLATION_UTF_16_LEN)); //L"Translation"
if (!var->szKey) {
pe_printf ("Warning: malloc (Var szKey)\n");
free_Var (var);
return NULL;
}
if (r_buf_read_at (pe->b, *curAddr, (ut8*) var->szKey, TRANSLATION_UTF_16_LEN) < 1) {
pe_printf ("Warning: read (Var szKey)\n");
free_Var (var);
return NULL;
}
*curAddr += TRANSLATION_UTF_16_LEN;
if (memcmp (var->szKey, TRANSLATION_UTF_16, TRANSLATION_UTF_16_LEN)) {
pe_printf ("Warning: check (Var szKey)\n");
free_Var (var);
return NULL;
}
align32 (*curAddr);
var->numOfValues = var->wValueLength / 4;
if (!var->numOfValues) {
pe_printf ("Warning: check (Var numOfValues)\n");
free_Var (var);
return NULL;
}
var->Value = (ut32*) malloc (var->wValueLength);
if (!var->Value) {
pe_printf ("Warning: malloc (Var Value)\n");
free_Var (var);
return NULL;
}
if (r_buf_read_at (pe->b, *curAddr, (ut8*) var->Value, var->wValueLength) != var->wValueLength) {
pe_printf ("Warning: read (Var Value)\n");
free_Var (var);
return NULL;
}
*curAddr += var->wValueLength;
return var;
} | 444 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | bin_pe_init_metadata_hdr | bin_pe_init_metadata_hdr( RBinPEObj * pe) | ['pe'] | static bool bin_pe_init_metadata_hdr(RBinPEObj* pe) {
PE_(image_metadata_header) * metadata = R_NEW0 (PE_(image_metadata_header));
if (!metadata) {
return false;
}
PE_DWord metadata_directory = pe->clr_hdr? PE_(va2pa) (pe, pe->clr_hdr->MetaDataDirectoryAddress): 0;
if (!metadata_directory) {
free (metadata);
return false;
}
int rr = r_buf_fread_at (pe->b, metadata_directory,
(ut8*) metadata, pe->big_endian? "1I2S": "1i2s", 1);
if (rr < 1) {
goto fail;
}
rr = r_buf_fread_at (pe->b, metadata_directory + 8,
(ut8*) (&metadata->Reserved), pe->big_endian? "1I": "1i", 1);
if (rr < 1) {
goto fail;
}
rr = r_buf_fread_at (pe->b, metadata_directory + 12,
(ut8*) (&metadata->VersionStringLength), pe->big_endian? "1I": "1i", 1);
if (rr < 1) {
goto fail;
}
eprintf ("Metadata Signature: 0x%"PFMT64x" 0x%"PFMT64x" %d\n",
(ut64)metadata_directory, (ut64)metadata->Signature, (int)metadata->VersionStringLength);
// read the version string
int len = metadata->VersionStringLength; // XXX: dont trust this length
if (len > 0) {
metadata->VersionString = calloc (1, len + 1);
if (!metadata->VersionString) {
goto fail;
}
rr = r_buf_read_at (pe->b, metadata_directory + 16, (ut8*)(metadata->VersionString), len);
if (rr != len) {
eprintf ("Warning: read (metadata header) - cannot parse version string\n");
free (metadata->VersionString);
free (metadata);
return 0;
}
eprintf (".NET Version: %s\n", metadata->VersionString);
}
// read the header after the string
rr = r_buf_fread_at (pe->b, metadata_directory + 16 + metadata->VersionStringLength,
(ut8*) (&metadata->Flags), pe->big_endian? "2S": "2s", 1);
if (rr < 1) {
goto fail;
}
eprintf ("Number of Metadata Streams: %d\n", metadata->NumberOfStreams);
pe->metadata_header = metadata;
// read metadata streams
int stream_addr = metadata_directory + 20 + metadata->VersionStringLength;
PE_(image_metadata_stream) * stream;
PE_(image_metadata_stream) **streams = calloc (sizeof (PE_(image_metadata_stream)*), metadata->NumberOfStreams);
if (!streams) {
goto fail;
}
int count;
for (count = 0; count < metadata->NumberOfStreams; count++) {
stream = R_NEW0 (PE_(image_metadata_stream));
if (!stream) {
free (streams);
goto fail;
}
if (r_buf_size (pe->b) < (stream_addr + 8 + MAX_METADATA_STRING_LENGTH)) {
eprintf ("Truncated\n");
free (stream);
free (streams);
goto fail;
}
if (r_buf_fread_at (pe->b, stream_addr, (ut8*) stream, pe->big_endian? "2I": "2i", 1) < 1) {
free (stream);
free (streams);
goto fail;
}
eprintf ("DirectoryAddress: %x Size: %x\n", stream->Offset, stream->Size);
char* stream_name = calloc (1, MAX_METADATA_STRING_LENGTH + 1);
if (!stream_name) {
free (stream);
free (streams);
goto fail;
}
int c = bin_pe_read_metadata_string (stream_name, pe->b, stream_addr + 8);
if (c == 0) {
free (stream_name);
free (stream);
free (streams);
goto fail;
}
eprintf ("Stream name: %s %d\n", stream_name, c);
stream->Name = stream_name;
streams[count] = stream;
stream_addr += 8 + c;
}
pe->streams = streams;
return true;
fail:
eprintf ("Warning: read (metadata header)\n");
free (metadata);
return false;
} | 711 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | bin_pe_parse_imports | bin_pe_parse_imports( RBinPEObj * pe , struct r_bin_pe_import_t ** importp , int * nimp , const char * dll_name , PE_DWord OriginalFirstThunk , PE_DWord FirstThunk) | ['pe', 'importp', 'nimp', 'dll_name', 'OriginalFirstThunk', 'FirstThunk'] | static int bin_pe_parse_imports(RBinPEObj* pe,
struct r_bin_pe_import_t** importp, int* nimp,
const char* dll_name,
PE_DWord OriginalFirstThunk,
PE_DWord FirstThunk) {
char import_name[PE_NAME_LENGTH + 1];
char name[PE_NAME_LENGTH + 1];
PE_Word import_hint, import_ordinal = 0;
PE_DWord import_table = 0, off = 0;
int i = 0, len;
Sdb* db = NULL;
char* sdb_module = NULL;
char* symname = NULL;
char* symdllname = NULL;
if (!dll_name || !*dll_name || *dll_name == '0') {
return 0;
}
if (!(off = PE_(va2pa) (pe, OriginalFirstThunk)) &&
!(off = PE_(va2pa) (pe, FirstThunk))) {
return 0;
}
do {
if (import_ordinal >= UT16_MAX) {
break;
}
if (off + i * sizeof (PE_DWord) > pe->size) {
break;
}
import_table = R_BUF_READ_PE_DWORD_AT (pe->b, off + i * sizeof (PE_DWord));
if (import_table == PE_DWORD_MAX) {
pe_printf ("Warning: read (import table)\n");
goto error;
} else if (import_table) {
if (import_table & ILT_MASK1) {
import_ordinal = import_table & ILT_MASK2;
import_hint = 0;
snprintf (import_name, PE_NAME_LENGTH, "Ordinal_%i", import_ordinal);
free (symdllname);
strncpy (name, dll_name, sizeof (name) - 1);
name[sizeof (name) - 1] = 0;
symdllname = strdup (name);
// remove the trailling ".dll"
size_t len = strlen (symdllname);
r_str_case (symdllname, 0);
len = len < 4? 0: len - 4;
symdllname[len] = 0;
char* filename = NULL;
if (!sdb_module || strcmp (symdllname, sdb_module)) {
sdb_free (db);
db = NULL;
free (sdb_module);
sdb_module = strdup (symdllname);
filename = r_str_newf ("%s.sdb", symdllname);
if (filename && r_file_exists (filename)) {
db = sdb_new (NULL, filename, 0);
} else {
const char *dirPrefix = r_sys_prefix (NULL);
char *lower_symdllname = strdup (symdllname);
r_str_case (lower_symdllname, false);
filename = r_str_newf (R_JOIN_4_PATHS ("%s", R2_SDB_FORMAT, "dll", "%s.sdb"),
dirPrefix, lower_symdllname);
free (lower_symdllname);
if (r_file_exists (filename)) {
db = sdb_new (NULL, filename, 0);
}
}
}
if (db) {
symname = resolveModuleOrdinal (db, symdllname, import_ordinal);
if (symname) {
snprintf (import_name, PE_NAME_LENGTH, "%s", symname);
R_FREE (symname);
}
} else {
pe_printf ("Cannot find %s\n", filename);
}
free (filename);
} else {
import_ordinal++;
const ut64 off = PE_(va2pa) (pe, import_table);
if (off > pe->size || (off + sizeof (PE_Word)) > pe->size) {
pe_printf ("Warning: off > pe->size\n");
goto error;
}
import_hint = r_buf_read_le16_at (pe->b, off);
if (import_hint == UT16_MAX) {
pe_printf ("Warning: read import hint at 0x%08"PFMT64x "\n", off);
goto error;
}
name[0] = '\0';
len = r_buf_read_at (pe->b, off + sizeof (PE_Word), (ut8*) name, PE_NAME_LENGTH);
if (len < 1) {
pe_printf ("Warning: read (import name)\n");
goto error;
} else if (!*name) {
break;
}
name[PE_NAME_LENGTH] = '\0';
int len = snprintf (import_name, sizeof (import_name), "%s" , name);
if (len >= sizeof (import_name)) {
eprintf ("Import name '%s' has been truncated.\n", import_name);
}
}
struct r_bin_pe_import_t *new_importp = realloc (*importp, (*nimp + 1) * sizeof (struct r_bin_pe_import_t));
if (!new_importp) {
r_sys_perror ("realloc (import)");
goto error;
}
*importp = new_importp;
memcpy ((*importp)[*nimp].name, import_name, PE_NAME_LENGTH);
(*importp)[*nimp].name[PE_NAME_LENGTH] = '\0';
memcpy ((*importp)[*nimp].libname, dll_name, PE_NAME_LENGTH);
(*importp)[*nimp].libname[PE_NAME_LENGTH] = '\0';
(*importp)[*nimp].vaddr = bin_pe_rva_to_va (pe, FirstThunk + i * sizeof (PE_DWord));
(*importp)[*nimp].paddr = PE_(va2pa) (pe, FirstThunk) + i * sizeof (PE_DWord);
(*importp)[*nimp].hint = import_hint;
(*importp)[*nimp].ordinal = import_ordinal;
(*importp)[*nimp].last = 0;
(*nimp)++;
i++;
}
} while (import_table);
if (db) {
sdb_free (db);
db = NULL;
}
free (symdllname);
free (sdb_module);
return i;
error:
if (db) {
sdb_free (db);
db = NULL;
}
free (symdllname);
free (sdb_module);
return false;
} | 979 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | estimate_slide | estimate_slide( RBinFile * bf , RDyldCache * cache , ut64 value_mask , ut64 value_add) | ['bf', 'cache', 'value_mask', 'value_add'] | static ut64 estimate_slide(RBinFile *bf, RDyldCache *cache, ut64 value_mask, ut64 value_add) {
ut64 slide = 0;
if (cache->n_hdr > 1) {
return slide;
}
ut64 *classlist = malloc (64);
if (!classlist) {
goto beach;
}
RListIter *iter;
RDyldBinImage *bin;
r_list_foreach (cache->bins, iter, bin) {
bool found_sample = false;
struct MACH0_(opts_t) opts = {0};
opts.verbose = bf->rbin->verbose;
opts.header_at = bin->header_at;
opts.symbols_off = 0;
struct MACH0_(obj_t) *mach0 = MACH0_(new_buf) (cache->buf, &opts);
if (!mach0) {
goto beach;
}
struct section_t *sections = NULL;
if (!(sections = MACH0_(get_sections) (mach0))) {
MACH0_(mach0_free) (mach0);
goto beach;
}
int i;
int incomplete = 2;
int classlist_idx = 0, data_idx = 0;
for (i = 0; !sections[i].last && incomplete; i++) {
if (sections[i].size == 0) {
continue;
}
if (strstr (sections[i].name, "__objc_classlist")) {
incomplete--;
classlist_idx = i;
continue;
}
if (strstr (sections[i].name, "__objc_data")) {
incomplete--;
data_idx = i;
continue;
}
}
if (incomplete) {
goto next_bin;
}
int classlist_sample_size = R_MIN (64, sections[classlist_idx].size);
int n_classes = classlist_sample_size / 8;
ut64 sect_offset = sections[classlist_idx].offset + bin->hdr_offset;
if (r_buf_fread_at (cache->buf, sect_offset, (ut8*) classlist, "l", n_classes) < classlist_sample_size) {
goto next_bin;
}
ut64 data_addr = sections[data_idx].addr;
ut64 data_tail = data_addr & 0xfff;
ut64 data_tail_end = (data_addr + sections[data_idx].size) & 0xfff;
for (i = 0; i < n_classes; i++) {
ut64 cl_addr = (classlist[i] & value_mask) + value_add;
ut64 cl_tail = cl_addr & 0xfff;
if (cl_tail >= data_tail && cl_tail < data_tail_end) {
ut64 off = cl_tail - data_tail;
slide = ((cl_addr - off) & value_mask) - (data_addr & value_mask);
found_sample = true;
break;
}
}
next_bin:
MACH0_(mach0_free) (mach0);
R_FREE (sections);
if (found_sample) {
break;
}
}
beach:
R_FREE (classlist);
return slide;
} | 502 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | entries | entries( RBinFile * bf) | ['bf'] | static RList* entries(RBinFile* bf) {
RList* ret = NULL;
RBinAddr* addr = NULL;
psxexe_header psxheader;
if (!(ret = r_list_new ())) {
return NULL;
}
if (!(addr = R_NEW0 (RBinAddr))) {
r_list_free (ret);
return NULL;
}
if (r_buf_fread_at (bf->buf, 0, (ut8*)&psxheader, "8c17i", 1) < sizeof (psxexe_header)) {
eprintf ("PSXEXE Header truncated\n");
r_list_free (ret);
free (addr);
return NULL;
}
addr->paddr = (psxheader.pc0 - psxheader.t_addr) + PSXEXE_TEXTSECTION_OFFSET;
addr->vaddr = psxheader.pc0;
r_list_append (ret, addr);
return ret;
} | 142 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | sections | sections( RBinFile * bf) | ['bf'] | static RList* sections(RBinFile* bf) {
RList* ret = NULL;
RBinSection* sect = NULL;
psxexe_header psxheader = {0};
ut64 sz = 0;
if (!(ret = r_list_new ())) {
return NULL;
}
if (!(sect = R_NEW0 (RBinSection))) {
r_list_free (ret);
return NULL;
}
if (r_buf_fread_at (bf->buf, 0, (ut8*)&psxheader, "8c17i", 1) < sizeof (psxexe_header)) {
eprintf ("Truncated Header\n");
free (sect);
r_list_free (ret);
return NULL;
}
sz = r_buf_size (bf->buf);
sect->name = strdup ("TEXT");
sect->paddr = PSXEXE_TEXTSECTION_OFFSET;
sect->size = sz - PSXEXE_TEXTSECTION_OFFSET;
sect->vaddr = psxheader.t_addr;
sect->vsize = psxheader.t_size;
sect->perm = R_PERM_RX;
sect->add = true;
sect->has_strings = true;
r_list_append (ret, sect);
return ret;
} | 193 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | lmf_header_load | lmf_header_load( lmf_header * lmfh , RBuffer * buf , Sdb * db) | ['lmfh', 'buf', 'db'] | static int lmf_header_load(lmf_header *lmfh, RBuffer *buf, Sdb *db) {
if (r_buf_size (buf) < sizeof (lmf_header)) {
return false;
}
if (r_buf_fread_at (buf, QNX_HEADER_ADDR, (ut8 *) lmfh, "iiiiiiiicccciiiicc", 1) < QNX_HDR_SIZE) {
return false;
}
r_strf_buffer (32);
sdb_set (db, "qnx.version", r_strf ("0x%xH", lmfh->version), 0);
sdb_set (db, "qnx.cflags", r_strf ("0x%xH", lmfh->cflags), 0);
sdb_set (db, "qnx.cpu", r_strf ("0x%xH", lmfh->cpu), 0);
sdb_set (db, "qnx.fpu", r_strf ("0x%xH", lmfh->fpu), 0);
sdb_set (db, "qnx.code_index", r_strf ("0x%x", lmfh->code_index), 0);
sdb_set (db, "qnx.stack_index", r_strf ("0x%x", lmfh->stack_index), 0);
sdb_set (db, "qnx.heap_index", r_strf ("0x%x", lmfh->heap_index), 0);
sdb_set (db, "qnx.argv_index", r_strf ("0x%x", lmfh->argv_index), 0);
sdb_set (db, "qnx.code_offset", r_strf ("0x%x", lmfh->code_offset), 0);
sdb_set (db, "qnx.stack_nbytes", r_strf ("0x%x", lmfh->stack_nbytes), 0);
sdb_set (db, "qnx.heap_nbytes", r_strf ("0x%x", lmfh->heap_nbytes), 0);
sdb_set (db, "qnx.image_base", r_strf ("0x%x", lmfh->image_base), 0);
return true;
} | 283 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | load_buffer | load_buffer( RBinFile * bf , void ** bin_obj , RBuffer * buf , ut64 loadaddr , Sdb * sdb) | ['bf', 'bin_obj', 'buf', 'loadaddr', 'sdb'] | static bool load_buffer(RBinFile *bf, void **bin_obj, RBuffer *buf, ut64 loadaddr, Sdb *sdb) {
QnxObj *qo = R_NEW0 (QnxObj);
if (!qo) {
return false;
}
lmf_record lrec;
lmf_resource lres;
lmf_data ldata;
ut64 offset = QNX_RECORD_SIZE;
RList *sections = NULL;
RList *fixups = NULL;
if (!qo) {
goto beach;
}
if (!(sections = r_list_newf ((RListFree)r_bin_section_free)) || !(fixups = r_list_new ())) {
goto beach;
}
qo->kv = sdb_new0 ();
if (!qo->kv) {
goto beach;
}
// Read the first record
if (r_buf_fread_at (bf->buf, 0, (ut8 *)&lrec, "ccss", 1) < QNX_RECORD_SIZE) {
goto beach;
}
// Load the header
lmf_header_load (&qo->lmfh, bf->buf, qo->kv);
offset += lrec.data_nbytes;
for (;;) {
if (r_buf_fread_at (bf->buf, offset, (ut8 *)&lrec, "ccss", 1) < QNX_RECORD_SIZE) {
goto beach;
}
offset += sizeof (lmf_record);
if (lrec.rec_type == LMF_IMAGE_END_REC) {
break;
} else if (lrec.rec_type == LMF_RESOURCE_REC) {
RBinSection *ptr = R_NEW0 (RBinSection);
if (!ptr) {
goto beach;
}
if (r_buf_fread_at (bf->buf, offset, (ut8 *)&lres, "ssss", 1) < sizeof (lmf_resource)) {
goto beach;
}
ptr->name = strdup ("LMF_RESOURCE");
ptr->paddr = offset;
ptr->vsize = lrec.data_nbytes - sizeof (lmf_resource);
ptr->size = ptr->vsize;
ptr->add = true;
r_list_append (sections, ptr);
} else if (lrec.rec_type == LMF_LOAD_REC) {
RBinSection *ptr = R_NEW0 (RBinSection);
if (r_buf_fread_at (bf->buf, offset, (ut8 *)&ldata, "si", 1) < sizeof (lmf_data)) {
goto beach;
}
if (!ptr) {
goto beach;
}
ptr->name = strdup ("LMF_LOAD");
ptr->paddr = offset;
ptr->vaddr = ldata.offset;
ptr->vsize = lrec.data_nbytes - sizeof (lmf_data);
ptr->size = ptr->vsize;
ptr->add = true;
r_list_append (sections, ptr);
} else if (lrec.rec_type == LMF_FIXUP_REC) {
RBinReloc *ptr = R_NEW0 (RBinReloc);
if (!ptr || r_buf_fread_at (bf->buf, offset, (ut8 *)&ldata, "si", 1) < sizeof (lmf_data)) {
goto beach;
}
ptr->vaddr = ptr->paddr = ldata.offset;
ptr->type = 'f'; // "LMF_FIXUP";
r_list_append (fixups, ptr);
} else if (lrec.rec_type == LMF_8087_FIXUP_REC) {
RBinReloc *ptr = R_NEW0 (RBinReloc);
if (!ptr || r_buf_fread_at (bf->buf, offset, (ut8 *)&ldata, "si", 1) < sizeof (lmf_data)) {
goto beach;
}
ptr->vaddr = ptr->paddr = ldata.offset;
ptr->type = 'F'; // "LMF_8087_FIXUP";
r_list_append (fixups, ptr);
} else if (lrec.rec_type == LMF_RW_END_REC) {
r_buf_fread_at (bf->buf, offset, (ut8 *)&qo->rwend, "si", 1);
}
offset += lrec.data_nbytes;
}
sdb_ns_set (sdb, "info", qo->kv);
qo->sections = sections;
qo->fixups = fixups;
*bin_obj = qo;
return true;
beach:
free (qo);
r_list_free (fixups);
r_list_free (sections);
return false;
} | 713 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | buf_format | buf_format( RBuffer * dst , RBuffer * src , const char * fmt , int n) | ['dst', 'src', 'fmt', 'n'] | static st64 buf_format(RBuffer *dst, RBuffer *src, const char *fmt, int n) {
st64 res = 0;
int i;
for (i = 0; i < n; i++) {
int j;
int m = 1;
int tsize = 2;
bool bigendian = true;
for (j = 0; fmt[j]; j++) {
switch (fmt[j]) {
case '0':
case '1':
case '2':
case '3':
case '4':
case '5':
case '6':
case '7':
case '8':
case '9':
if (m == 1) {
m = r_num_get (NULL, &fmt[j]);
}
continue;
case 's': tsize = 2; bigendian = false; break;
case 'S': tsize = 2; bigendian = true; break;
case 'i': tsize = 4; bigendian = false; break;
case 'I': tsize = 4; bigendian = true; break;
case 'l': tsize = 8; bigendian = false; break;
case 'L': tsize = 8; bigendian = true; break;
case 'c': tsize = 1; bigendian = false; break;
default: return -1;
}
int k;
for (k = 0; k < m; k++) {
ut8 tmp[sizeof (ut64)];
ut8 d1;
ut16 d2;
ut32 d3;
ut64 d4;
st64 r = r_buf_read (src, tmp, tsize);
if (r < tsize) {
return -1;
}
switch (tsize) {
case 1:
d1 = r_read_ble8 (tmp);
r = r_buf_write (dst, (ut8 *)&d1, 1);
break;
case 2:
d2 = r_read_ble16 (tmp, bigendian);
r = r_buf_write (dst, (ut8 *)&d2, 2);
break;
case 4:
d3 = r_read_ble32 (tmp, bigendian);
r = r_buf_write (dst, (ut8 *)&d3, 4);
break;
case 8:
d4 = r_read_ble64 (tmp, bigendian);
r = r_buf_write (dst, (ut8 *)&d4, 8);
break;
}
if (r < 0) {
return -1;
}
res += r;
}
m = 1;
}
}
return res;
} | 446 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_buf_fread_at | r_buf_fread_at( RBuffer * b , ut64 addr , ut8 * buf , const char * fmt , int n) | ['b', 'addr', 'buf', 'fmt', 'n'] | R_API st64 r_buf_fread_at(RBuffer *b, ut64 addr, ut8 *buf, const char *fmt, int n) {
r_return_val_if_fail (b && buf && fmt, -1);
st64 o_addr = r_buf_seek (b, 0, R_BUF_CUR);
st64 r = r_buf_seek (b, addr, R_BUF_SET);
if (r < 0) {
return r;
}
r = r_buf_fread (b, buf, fmt, n);
r_buf_seek (b, o_addr, R_BUF_SET);
return r;
} | 95 | True | 1 |
CVE-2022-0695 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'name': 'https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'name': 'https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/', 'name': 'FEDORA-2022-7db9e7bb5b', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/', 'name': 'FEDORA-2022-85b277e748', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-400'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.4', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}] | 2022-04-08T13:57Z | 2022-02-24T13:15Z | Uncontrolled Resource Consumption | The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
Limited resources include memory, file system storage, database connection pool entries, and CPU. If an attacker can trigger the allocation of these limited resources, but the number or size of the resources is not controlled, then the attacker could cause a denial of service that consumes all available resources. This would prevent valid users from accessing the software, and it could potentially have an impact on the surrounding environment. For example, a memory exhaustion attack against an application could slow down the application as well as its host operating system.
There are at least three distinct scenarios which can commonly lead to resource exhaustion:
Lack of throttling for the number of allocated resources
Losing all references to a resource before reaching the shutdown stage
Not closing/returning a resource after processing
Resource exhaustion problems are often result due to an incorrect implementation of the following situations:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for releasing the resource.
| https://cwe.mitre.org/data/definitions/400.html | 0 | pancake | 2022-02-23 22:54:54+01:00 | Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_buf_read_at | r_buf_read_at( RBuffer * b , ut64 addr , ut8 * buf , ut64 len) | ['b', 'addr', 'buf', 'len'] | R_API st64 r_buf_read_at(RBuffer *b, ut64 addr, ut8 *buf, ut64 len) {
r_return_val_if_fail (b && buf, -1);
st64 o_addr = r_buf_seek (b, 0, R_BUF_CUR);
st64 r = r_buf_seek (b, addr, R_BUF_SET);
if (r < 0) {
return r;
}
r = r_buf_read (b, buf, len);
r_buf_seek (b, o_addr, R_BUF_SET);
return r;
} | 86 | True | 1 |
CVE-2022-0849 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24', 'name': 'https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6', 'name': 'https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-10T21:44Z | 2022-03-05T10:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | Sergi Àlvarez i Capilla | 2022-03-04 10:48:13+01:00 | aaef on arm/thumb switches causes uaf ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer: poc_uaf_r_reg_get | 10517e3ff0e609697eb8cde60ec8dc999ee5ea24 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_core_anal_esil | r_core_anal_esil( RCore * core , const char * str , const char * target) | ['core', 'str', 'target'] | R_API void r_core_anal_esil(RCore *core, const char *str, const char *target) {
bool cfg_anal_strings = r_config_get_i (core->config, "anal.strings");
bool emu_lazy = r_config_get_i (core->config, "emu.lazy");
bool gp_fixed = r_config_get_i (core->config, "anal.gpfixed");
RAnalEsil *ESIL = core->anal->esil;
ut64 refptr = 0LL;
const char *pcname;
RAnalOp op = R_EMPTY;
ut8 *buf = NULL;
bool end_address_set = false;
int iend;
int minopsize = 4; // XXX this depends on asm->mininstrsize
bool archIsArm = false;
ut64 addr = core->offset;
ut64 start = addr;
ut64 end = 0LL;
ut64 cur;
if (esil_anal_stop || r_cons_is_breaked ()) {
// faster ^C
return;
}
mycore = core;
if (!strcmp (str, "?")) {
eprintf ("Usage: aae[f] [len] [addr] - analyze refs in function, section or len bytes with esil\n");
eprintf (" aae $SS @ $S - analyze the whole section\n");
eprintf (" aae $SS str.Hello @ $S - find references for str.Hellow\n");
eprintf (" aaef - analyze functions discovered with esil\n");
return;
}
#define CHECKREF(x) ((refptr && (x) == refptr) || !refptr)
if (target) {
const char *expr = r_str_trim_head_ro (target);
if (*expr) {
refptr = ntarget = r_num_math (core->num, expr);
if (!refptr) {
ntarget = refptr = addr;
}
} else {
ntarget = UT64_MAX;
refptr = 0LL;
}
} else {
ntarget = UT64_MAX;
refptr = 0LL;
}
RAnalFunction *fcn = NULL;
if (!strcmp (str, "f")) {
fcn = r_anal_get_fcn_in (core->anal, core->offset, 0);
if (fcn) {
start = r_anal_function_min_addr (fcn);
addr = fcn->addr;
end = r_anal_function_max_addr (fcn);
end_address_set = true;
}
}
if (!end_address_set) {
if (str[0] == ' ') {
end = addr + r_num_math (core->num, str + 1);
} else {
RIOMap *map = r_io_map_get_at (core->io, addr);
if (map) {
end = r_io_map_end (map);
} else {
end = addr + core->blocksize;
}
}
}
iend = end - start;
if (iend < 0) {
return;
}
if (iend > MAX_SCAN_SIZE) {
eprintf ("Warning: Not going to analyze 0x%08"PFMT64x" bytes.\n", (ut64)iend);
return;
}
buf = malloc ((size_t)iend + 2);
if (!buf) {
perror ("malloc");
return;
}
esilbreak_last_read = UT64_MAX;
r_io_read_at (core->io, start, buf, iend + 1);
if (!ESIL) {
r_core_cmd0 (core, "aei");
ESIL = core->anal->esil;
if (!ESIL) {
eprintf ("ESIL not initialized\n");
return;
}
r_core_cmd0 (core, "aeim");
ESIL = core->anal->esil;
}
const char *spname = r_reg_get_name (core->anal->reg, R_REG_NAME_SP);
if (!spname) {
eprintf ("Error: No =SP defined in the reg profile.\n");
return;
}
EsilBreakCtx ctx = {
&op,
fcn,
spname,
r_reg_getv (core->anal->reg, spname)
};
ESIL->cb.hook_reg_write = &esilbreak_reg_write;
//this is necessary for the hook to read the id of analop
ESIL->user = &ctx;
ESIL->cb.hook_mem_read = &esilbreak_mem_read;
ESIL->cb.hook_mem_write = &esilbreak_mem_write;
if (fcn && fcn->reg_save_area) {
r_reg_setv (core->anal->reg, ctx.spname, ctx.initial_sp - fcn->reg_save_area);
}
//eprintf ("Analyzing ESIL refs from 0x%"PFMT64x" - 0x%"PFMT64x"\n", addr, end);
// TODO: backup/restore register state before/after analysis
pcname = r_reg_get_name (core->anal->reg, R_REG_NAME_PC);
if (!pcname || !*pcname) {
eprintf ("Cannot find program counter register in the current profile.\n");
return;
}
esil_anal_stop = false;
r_cons_break_push (cccb, core);
int arch = -1;
if (!strcmp (core->anal->cur->arch, "arm")) {
switch (core->anal->cur->bits) {
case 64: arch = R2_ARCH_ARM64; break;
case 32: arch = R2_ARCH_ARM32; break;
case 16: arch = R2_ARCH_THUMB; break;
}
archIsArm = true;
}
ut64 gp = r_config_get_i (core->config, "anal.gp");
const char *gp_reg = NULL;
if (!strcmp (core->anal->cur->arch, "mips")) {
gp_reg = "gp";
arch = R2_ARCH_MIPS;
}
const char *sn = r_reg_get_name (core->anal->reg, R_REG_NAME_SN);
if (!sn) {
eprintf ("Warning: No SN reg alias for current architecture.\n");
}
r_reg_arena_push (core->anal->reg);
IterCtx ictx = { start, end, fcn, NULL };
size_t i = addr - start;
size_t i_old = 0;
do {
if (esil_anal_stop || r_cons_is_breaked ()) {
break;
}
cur = start + i;
if (!r_io_is_valid_offset (core->io, cur, 0)) {
break;
}
#if 0
// disabled because it causes some tests to fail
{
RPVector *list = r_meta_get_all_in (core->anal, cur, R_META_TYPE_ANY);
void **it;
r_pvector_foreach (list, it) {
RIntervalNode *node = *it;
RAnalMetaItem *meta = node->data;
switch (meta->type) {
case R_META_TYPE_DATA:
case R_META_TYPE_STRING:
case R_META_TYPE_FORMAT:
#if 0
{
int msz = r_meta_get_size (core->anal, meta->type);
i += (msz > 0)? msz: minopsize;
}
r_pvector_free (list);
goto loopback;
#elif 0
{
int msz = r_meta_get_size (core->anal, meta->type);
i += (msz > 0)? msz: minopsize;
i--;
}
#else
i += 4;
goto repeat;
#endif
default:
break;
}
}
r_pvector_free (list);
}
#endif
/* realign address if needed */
r_core_seek_arch_bits (core, cur);
int opalign = core->anal->pcalign;
if (opalign > 0) {
cur -= (cur % opalign);
}
r_anal_op_fini (&op);
r_asm_set_pc (core->rasm, cur);
i_old = i;
#if 1
if (i > iend) {
goto repeat;
}
#endif
if (!r_anal_op (core->anal, &op, cur, buf + i, iend - i, R_ANAL_OP_MASK_ESIL | R_ANAL_OP_MASK_VAL | R_ANAL_OP_MASK_HINT)) {
i += minopsize - 1; // XXX dupe in op.size below
}
if (op.type == R_ANAL_OP_TYPE_ILL || op.type == R_ANAL_OP_TYPE_UNK) {
// i += 2
r_anal_op_fini (&op);
goto repeat;
}
//we need to check again i because buf+i may goes beyond its boundaries
//because of i+= minopsize - 1
if (op.size < 1) {
i += minopsize - 1;
goto repeat;
}
if (emu_lazy) {
if (op.type & R_ANAL_OP_TYPE_REP) {
i += op.size - 1;
goto repeat;
}
switch (op.type & R_ANAL_OP_TYPE_MASK) {
case R_ANAL_OP_TYPE_JMP:
case R_ANAL_OP_TYPE_CJMP:
case R_ANAL_OP_TYPE_CALL:
case R_ANAL_OP_TYPE_RET:
case R_ANAL_OP_TYPE_ILL:
case R_ANAL_OP_TYPE_NOP:
case R_ANAL_OP_TYPE_UJMP:
case R_ANAL_OP_TYPE_IO:
case R_ANAL_OP_TYPE_LEAVE:
case R_ANAL_OP_TYPE_CRYPTO:
case R_ANAL_OP_TYPE_CPL:
case R_ANAL_OP_TYPE_SYNC:
case R_ANAL_OP_TYPE_SWI:
case R_ANAL_OP_TYPE_CMP:
case R_ANAL_OP_TYPE_ACMP:
case R_ANAL_OP_TYPE_NULL:
case R_ANAL_OP_TYPE_CSWI:
case R_ANAL_OP_TYPE_TRAP:
i += op.size - 1;
goto repeat;
// those require write support
case R_ANAL_OP_TYPE_PUSH:
case R_ANAL_OP_TYPE_POP:
i += op.size - 1;
goto repeat;
}
}
if (sn && op.type == R_ANAL_OP_TYPE_SWI) {
r_strf_buffer (64);
r_flag_space_set (core->flags, R_FLAGS_FS_SYSCALLS);
int snv = (arch == R2_ARCH_THUMB)? op.val: (int)r_reg_getv (core->anal->reg, sn);
RSyscallItem *si = r_syscall_get (core->anal->syscall, snv, -1);
if (si) {
// eprintf ("0x%08"PFMT64x" SYSCALL %-4d %s\n", cur, snv, si->name);
r_flag_set_next (core->flags, r_strf ("syscall.%s", si->name), cur, 1);
} else {
//todo were doing less filtering up top because we can't match against 80 on all platforms
// might get too many of this path now..
// eprintf ("0x%08"PFMT64x" SYSCALL %d\n", cur, snv);
r_flag_set_next (core->flags, r_strf ("syscall.%d", snv), cur, 1);
}
r_flag_space_set (core->flags, NULL);
r_syscall_item_free (si);
}
const char *esilstr = R_STRBUF_SAFEGET (&op.esil);
i += op.size - 1;
if (R_STR_ISEMPTY (esilstr)) {
goto repeat;
}
r_anal_esil_set_pc (ESIL, cur);
r_reg_setv (core->anal->reg, pcname, cur + op.size);
if (gp_fixed && gp_reg) {
r_reg_setv (core->anal->reg, gp_reg, gp);
}
(void)r_anal_esil_parse (ESIL, esilstr);
// looks like ^C is handled by esil_parse !!!!
//r_anal_esil_dumpstack (ESIL);
//r_anal_esil_stack_free (ESIL);
switch (op.type) {
case R_ANAL_OP_TYPE_LEA:
// arm64
if (core->anal->cur && arch == R2_ARCH_ARM64) {
if (CHECKREF (ESIL->cur)) {
r_anal_xrefs_set (core->anal, cur, ESIL->cur, R_ANAL_REF_TYPE_STRING);
}
} else if ((target && op.ptr == ntarget) || !target) {
if (CHECKREF (ESIL->cur)) {
if (op.ptr && r_io_is_valid_offset (core->io, op.ptr, !core->anal->opt.noncode)) {
r_anal_xrefs_set (core->anal, cur, op.ptr, R_ANAL_REF_TYPE_STRING);
} else {
r_anal_xrefs_set (core->anal, cur, ESIL->cur, R_ANAL_REF_TYPE_STRING);
}
}
}
if (cfg_anal_strings) {
add_string_ref (core, op.addr, op.ptr);
}
break;
case R_ANAL_OP_TYPE_ADD:
/* TODO: test if this is valid for other archs too */
if (core->anal->cur && archIsArm) {
/* This code is known to work on Thumb, ARM and ARM64 */
ut64 dst = ESIL->cur;
if ((target && dst == ntarget) || !target) {
if (CHECKREF (dst)) {
int type = core_type_by_addr (core, dst); // R_ANAL_REF_TYPE_DATA;
r_anal_xrefs_set (core->anal, cur, dst, type);
}
}
if (cfg_anal_strings) {
add_string_ref (core, op.addr, dst);
}
} else if ((core->anal->bits == 32 && core->anal->cur && arch == R2_ARCH_MIPS)) {
ut64 dst = ESIL->cur;
if (!op.src[0] || !op.src[0]->reg || !op.src[0]->reg->name) {
break;
}
if (!strcmp (op.src[0]->reg->name, "sp")) {
break;
}
if (!strcmp (op.src[0]->reg->name, "zero")) {
break;
}
if ((target && dst == ntarget) || !target) {
if (dst > 0xffff && op.src[1] && (dst & 0xffff) == (op.src[1]->imm & 0xffff) && myvalid (mycore->io, dst)) {
RFlagItem *f;
char *str;
if (CHECKREF (dst) || CHECKREF (cur)) {
r_anal_xrefs_set (core->anal, cur, dst, R_ANAL_REF_TYPE_DATA);
if (cfg_anal_strings) {
add_string_ref (core, op.addr, dst);
}
if ((f = r_core_flag_get_by_spaces (core->flags, dst))) {
r_meta_set_string (core->anal, R_META_TYPE_COMMENT, cur, f->name);
} else if ((str = is_string_at (mycore, dst, NULL))) {
char *str2 = r_str_newf ("esilref: '%s'", str);
// HACK avoid format string inside string used later as format
// string crashes disasm inside agf under some conditions.
// https://github.com/radareorg/radare2/issues/6937
r_str_replace_char (str2, '%', '&');
r_meta_set_string (core->anal, R_META_TYPE_COMMENT, cur, str2);
free (str2);
free (str);
}
}
}
}
}
break;
case R_ANAL_OP_TYPE_LOAD:
{
ut64 dst = esilbreak_last_read;
if (dst != UT64_MAX && CHECKREF (dst)) {
if (myvalid (mycore->io, dst)) {
r_anal_xrefs_set (core->anal, cur, dst, R_ANAL_REF_TYPE_DATA);
if (cfg_anal_strings) {
add_string_ref (core, op.addr, dst);
}
}
}
dst = esilbreak_last_data;
if (dst != UT64_MAX && CHECKREF (dst)) {
if (myvalid (mycore->io, dst)) {
r_anal_xrefs_set (core->anal, cur, dst, R_ANAL_REF_TYPE_DATA);
if (cfg_anal_strings) {
add_string_ref (core, op.addr, dst);
}
}
}
}
break;
case R_ANAL_OP_TYPE_JMP:
{
ut64 dst = op.jump;
if (CHECKREF (dst)) {
if (myvalid (core->io, dst)) {
r_anal_xrefs_set (core->anal, cur, dst, R_ANAL_REF_TYPE_CODE);
}
}
}
break;
case R_ANAL_OP_TYPE_CALL:
{
ut64 dst = op.jump;
if (CHECKREF (dst)) {
if (myvalid (core->io, dst)) {
r_anal_xrefs_set (core->anal, cur, dst, R_ANAL_REF_TYPE_CALL);
}
ESIL->old = cur + op.size;
getpcfromstack (core, ESIL);
}
}
break;
case R_ANAL_OP_TYPE_UJMP:
case R_ANAL_OP_TYPE_UCALL:
case R_ANAL_OP_TYPE_ICALL:
case R_ANAL_OP_TYPE_RCALL:
case R_ANAL_OP_TYPE_IRCALL:
case R_ANAL_OP_TYPE_MJMP:
{
ut64 dst = core->anal->esil->jump_target;
if (dst == 0 || dst == UT64_MAX) {
dst = r_reg_getv (core->anal->reg, pcname);
}
if (CHECKREF (dst)) {
if (myvalid (core->io, dst)) {
RAnalRefType ref =
(op.type & R_ANAL_OP_TYPE_MASK) == R_ANAL_OP_TYPE_UCALL
? R_ANAL_REF_TYPE_CALL
: R_ANAL_REF_TYPE_CODE;
r_anal_xrefs_set (core->anal, cur, dst, ref);
r_core_anal_fcn (core, dst, UT64_MAX, R_ANAL_REF_TYPE_NULL, 1);
// analyze function here
#if 0
if (op.type == R_ANAL_OP_TYPE_UCALL || op.type == R_ANAL_OP_TYPE_RCALL) {
eprintf ("0x%08"PFMT64x" RCALL TO %llx\n", cur, dst);
}
#endif
}
}
}
break;
default:
break;
}
r_anal_esil_stack_free (ESIL);
repeat:
if (!r_anal_get_block_at (core->anal, cur)) {
size_t fcn_i;
for (fcn_i = i_old + 1; fcn_i <= i; fcn_i++) {
if (r_anal_get_function_at (core->anal, start + fcn_i)) {
i = fcn_i - 1;
break;
}
}
}
if (i >= iend) {
break;
}
} while (get_next_i (&ictx, &i));
r_list_free (ictx.bbl);
r_list_free (ictx.path);
r_list_free (ictx.switch_path);
free (buf);
ESIL->cb.hook_mem_read = NULL;
ESIL->cb.hook_mem_write = NULL;
ESIL->cb.hook_reg_write = NULL;
ESIL->user = NULL;
r_anal_op_fini (&op);
r_cons_break_pop ();
// restore register
r_reg_arena_pop (core->anal->reg);
} | 2638 | True | 1 |
CVE-2022-1031 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457', 'name': 'https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb', 'name': 'https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-416'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-28T20:11Z | 2022-03-22T20:15Z | Use After Free | Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. |
The use of previously-freed memory can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw. The simplest way data corruption may occur involves the system's reuse of the freed memory. Use-after-free errors have two common and sometimes overlapping causes:
Error conditions and other exceptional circumstances.
Confusion over which part of the program is responsible for freeing the memory.
In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.
| https://cwe.mitre.org/data/definitions/416.html | 0 | pancake | 2022-03-21 17:48:44+01:00 | Fix UAF in aaaa on arm/thumb switching ##crash
* Reported by @peacock-doris via huntr.dev
* Reproducer tests_65185
* This is a logic fix, but not the fully safe as changes in the code
can result on UAF again, to properly protect r2 from crashing we
need to break the ABI and add refcounting to RRegItem, which can't
happen in 5.6.x because of abi-compat rules | a7ce29647fcb38386d7439696375e16e093d6acb | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | extract_arg | extract_arg( RAnal * anal , RAnalFunction * fcn , RAnalOp * op , const char * reg , const char * sign , char type) | ['anal', 'fcn', 'op', 'reg', 'sign', 'type'] | static void extract_arg(RAnal *anal, RAnalFunction *fcn, RAnalOp *op, const char *reg, const char *sign, char type) {
st64 ptr = 0;
char *addr, *esil_buf = NULL;
const st64 maxstackframe = 1024 * 8;
r_return_if_fail (anal && fcn && op && reg);
size_t i;
for (i = 0; i < R_ARRAY_SIZE (op->src); i++) {
if (op->src[i] && op->src[i]->reg && op->src[i]->reg->name) {
if (!strcmp (reg, op->src[i]->reg->name)) {
st64 delta = op->src[i]->delta;
if ((delta > 0 && *sign == '+') || (delta < 0 && *sign == '-')) {
ptr = R_ABS (op->src[i]->delta);
break;
}
}
}
}
if (!ptr) {
const char *op_esil = r_strbuf_get (&op->esil);
if (!op_esil) {
return;
}
esil_buf = strdup (op_esil);
if (!esil_buf) {
return;
}
r_strf_var (esilexpr, 64, ",%s,%s,", reg, sign);
char *ptr_end = strstr (esil_buf, esilexpr);
if (!ptr_end) {
free (esil_buf);
return;
}
*ptr_end = 0;
addr = ptr_end;
while ((addr[0] != '0' || addr[1] != 'x') && addr >= esil_buf + 1 && *addr != ',') {
addr--;
}
if (strncmp (addr, "0x", 2)) {
//XXX: This is a workaround for inconsistent esil
if (!op->stackop && op->dst) {
const char *sp = r_reg_get_name (anal->reg, R_REG_NAME_SP);
const char *bp = r_reg_get_name (anal->reg, R_REG_NAME_BP);
const char *rn = op->dst->reg ? op->dst->reg->name : NULL;
if (rn && ((bp && !strcmp (bp, rn)) || (sp && !strcmp (sp, rn)))) {
if (anal->verbose) {
eprintf ("Warning: Analysis didn't fill op->stackop for instruction that alters stack at 0x%" PFMT64x ".\n", op->addr);
}
goto beach;
}
}
if (*addr == ',') {
addr++;
}
if (!op->stackop && op->type != R_ANAL_OP_TYPE_PUSH && op->type != R_ANAL_OP_TYPE_POP
&& op->type != R_ANAL_OP_TYPE_RET && r_str_isnumber (addr)) {
ptr = (st64)r_num_get (NULL, addr);
if (ptr && op->src[0] && ptr == op->src[0]->imm) {
goto beach;
}
} else if ((op->stackop == R_ANAL_STACK_SET) || (op->stackop == R_ANAL_STACK_GET)) {
if (op->ptr % 4) {
goto beach;
}
ptr = R_ABS (op->ptr);
} else {
goto beach;
}
} else {
ptr = (st64)r_num_get (NULL, addr);
}
}
if (anal->verbose && (!op->src[0] || !op->dst)) {
eprintf ("Warning: Analysis didn't fill op->src/dst at 0x%" PFMT64x ".\n", op->addr);
}
int rw = (op->direction == R_ANAL_OP_DIR_WRITE) ? R_ANAL_VAR_ACCESS_TYPE_WRITE : R_ANAL_VAR_ACCESS_TYPE_READ;
if (*sign == '+') {
const bool isarg = type == R_ANAL_VAR_KIND_SPV ? ptr >= fcn->stack : ptr >= fcn->bp_off;
const char *pfx = isarg ? ARGPREFIX : VARPREFIX;
st64 frame_off;
if (type == R_ANAL_VAR_KIND_SPV) {
frame_off = ptr - fcn->stack;
} else {
frame_off = ptr - fcn->bp_off;
}
if (maxstackframe != 0 && (frame_off > maxstackframe || frame_off < -maxstackframe)) {
goto beach;
}
RAnalVar *var = get_stack_var (fcn, frame_off);
if (var) {
r_anal_var_set_access (var, reg, op->addr, rw, ptr);
goto beach;
}
char *varname = NULL, *vartype = NULL;
if (isarg) {
const char *place = fcn->cc ? r_anal_cc_arg (anal, fcn->cc, ST32_MAX) : NULL;
bool stack_rev = place ? !strcmp (place, "stack_rev") : false;
char *fname = r_type_func_guess (anal->sdb_types, fcn->name);
if (fname) {
ut64 sum_sz = 0;
size_t from, to, i;
if (stack_rev) {
const size_t cnt = r_type_func_args_count (anal->sdb_types, fname);
from = cnt ? cnt - 1 : cnt;
to = fcn->cc ? r_anal_cc_max_arg (anal, fcn->cc) : 0;
} else {
from = fcn->cc ? r_anal_cc_max_arg (anal, fcn->cc) : 0;
to = r_type_func_args_count (anal->sdb_types, fname);
}
const int bytes = (fcn->bits ? fcn->bits : anal->bits) / 8;
for (i = from; stack_rev ? i >= to : i < to; stack_rev ? i-- : i++) {
char *tp = r_type_func_args_type (anal->sdb_types, fname, i);
if (!tp) {
break;
}
if (sum_sz == frame_off) {
vartype = tp;
varname = strdup (r_type_func_args_name (anal->sdb_types, fname, i));
break;
}
ut64 bit_sz = r_type_get_bitsize (anal->sdb_types, tp);
sum_sz += bit_sz ? bit_sz / 8 : bytes;
sum_sz = R_ROUND (sum_sz, bytes);
free (tp);
}
free (fname);
}
}
if (!varname) {
if (anal->opt.varname_stack) {
varname = r_str_newf ("%s_%" PFMT64x "h", pfx, R_ABS (frame_off));
} else {
varname = r_anal_function_autoname_var (fcn, type, pfx, ptr);
}
}
if (varname) {
#if 0
if (isarg && frame_off > 48) {
free (varname);
goto beach;
}
#endif
RAnalVar *var = r_anal_function_set_var (fcn, frame_off, type, vartype, anal->bits / 8, isarg, varname);
if (var) {
r_anal_var_set_access (var, reg, op->addr, rw, ptr);
}
free (varname);
}
free (vartype);
} else {
st64 frame_off = -(ptr + fcn->bp_off);
if (maxstackframe != 0 && (frame_off > maxstackframe || frame_off < -maxstackframe)) {
goto beach;
}
RAnalVar *var = get_stack_var (fcn, frame_off);
if (var) {
r_anal_var_set_access (var, reg, op->addr, rw, -ptr);
goto beach;
}
char *varname = anal->opt.varname_stack
? r_str_newf ("%s_%" PFMT64x "h", VARPREFIX, R_ABS (frame_off))
: r_anal_function_autoname_var (fcn, type, VARPREFIX, -ptr);
if (varname) {
RAnalVar *var = r_anal_function_set_var (fcn, frame_off, type, NULL, anal->bits / 8, false, varname);
if (var) {
r_anal_var_set_access (var, reg, op->addr, rw, -ptr);
}
free (varname);
}
}
beach:
free (esil_buf);
} | 1377 | True | 1 |
CVE-2022-1052 | False | False | False | False | AV:L/AC:L/Au:N/C:N/I:N/A:P | LOCAL | LOW | NONE | NONE | NONE | PARTIAL | 2.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | LOCAL | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'name': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'name': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-31T18:56Z | 2022-03-24T13:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | pancake | 2022-03-22 16:56:27+01:00 | Fix heap OOB read in macho.iterate_chained_fixups ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer 'tests_65305'
mrmacete:
* Return early if segs_count is 0
* Initialize segs_count also for reconstructed fixups
Co-authored-by: pancake <[email protected]>
Co-authored-by: Francesco Tamagni <[email protected]> | 0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | MACH0_( iterate_chained_fixups) | MACH0_( iterate_chained_fixups)( struct MACH0_(obj_t) * bin , ut64 limit_start , ut64 limit_end , ut32 event_mask , RFixupCallback callback , void * context) | ['bin', 'limit_start', 'limit_end', 'event_mask', 'callback', 'context'] | void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start, ut64 limit_end, ut32 event_mask, RFixupCallback callback, void * context) {
int i = 0;
for (; i < bin->nsegs; i++) {
if (!bin->chained_starts[i]) {
continue;
}
int page_size = bin->chained_starts[i]->page_size;
if (page_size < 1) {
page_size = 4096;
}
ut64 start = bin->segs[i].fileoff;
ut64 end = start + bin->segs[i].filesize;
if (end >= limit_start && start <= limit_end) {
ut64 page_idx = (R_MAX (start, limit_start) - start) / page_size;
ut64 page_end_idx = (R_MIN (limit_end, end) - start) / page_size;
for (; page_idx <= page_end_idx; page_idx++) {
if (page_idx >= bin->chained_starts[i]->page_count) {
break;
}
ut16 page_start = bin->chained_starts[i]->page_start[page_idx];
if (page_start == DYLD_CHAINED_PTR_START_NONE) {
continue;
}
ut64 cursor = start + page_idx * page_size + page_start;
while (cursor < limit_end && cursor < end) {
ut8 tmp[8];
bool previous_rebasing = bin->rebasing_buffer;
bin->rebasing_buffer = true;
if (r_buf_read_at (bin->b, cursor, tmp, 8) != 8) {
bin->rebasing_buffer = previous_rebasing;
break;
}
bin->rebasing_buffer = previous_rebasing;
ut64 raw_ptr = r_read_le64 (tmp);
ut64 ptr_value = raw_ptr;
ut64 delta, stride, addend;
ut16 pointer_format = bin->chained_starts[i]->pointer_format;
RFixupEvent event = R_FIXUP_EVENT_NONE;
ut8 key = 0, addr_div = 0;
ut16 diversity = 0;
ut32 ordinal = UT32_MAX;
if (pointer_format == DYLD_CHAINED_PTR_ARM64E) {
stride = 8;
bool is_auth = IS_PTR_AUTH (raw_ptr);
bool is_bind = IS_PTR_BIND (raw_ptr);
if (is_auth && is_bind) {
struct dyld_chained_ptr_arm64e_auth_bind *p =
(struct dyld_chained_ptr_arm64e_auth_bind *) &raw_ptr;
event = R_FIXUP_EVENT_BIND_AUTH;
delta = p->next;
ordinal = p->ordinal;
key = p->key;
addr_div = p->addrDiv;
diversity = p->diversity;
} else if (!is_auth && is_bind) {
struct dyld_chained_ptr_arm64e_bind *p =
(struct dyld_chained_ptr_arm64e_bind *) &raw_ptr;
event = R_FIXUP_EVENT_BIND;
delta = p->next;
ordinal = p->ordinal;
addend = p->addend;
} else if (is_auth && !is_bind) {
struct dyld_chained_ptr_arm64e_auth_rebase *p =
(struct dyld_chained_ptr_arm64e_auth_rebase *) &raw_ptr;
event = R_FIXUP_EVENT_REBASE_AUTH;
delta = p->next;
ptr_value = p->target + bin->baddr;
key = p->key;
addr_div = p->addrDiv;
diversity = p->diversity;
} else {
struct dyld_chained_ptr_arm64e_rebase *p =
(struct dyld_chained_ptr_arm64e_rebase *) &raw_ptr;
event = R_FIXUP_EVENT_REBASE;
delta = p->next;
ptr_value = ((ut64)p->high8 << 56) | p->target;
}
} else if (pointer_format == DYLD_CHAINED_PTR_ARM64E_USERLAND24) {
stride = 8;
struct dyld_chained_ptr_arm64e_bind24 *bind =
(struct dyld_chained_ptr_arm64e_bind24 *) &raw_ptr;
if (bind->bind) {
delta = bind->next;
if (bind->auth) {
struct dyld_chained_ptr_arm64e_auth_bind24 *p =
(struct dyld_chained_ptr_arm64e_auth_bind24 *) &raw_ptr;
event = R_FIXUP_EVENT_BIND_AUTH;
ordinal = p->ordinal;
key = p->key;
addr_div = p->addrDiv;
diversity = p->diversity;
} else {
event = R_FIXUP_EVENT_BIND;
ordinal = bind->ordinal;
addend = bind->addend;
}
} else {
if (bind->auth) {
struct dyld_chained_ptr_arm64e_auth_rebase *p =
(struct dyld_chained_ptr_arm64e_auth_rebase *) &raw_ptr;
event = R_FIXUP_EVENT_REBASE_AUTH;
delta = p->next;
ptr_value = p->target + bin->baddr;
key = p->key;
addr_div = p->addrDiv;
diversity = p->diversity;
} else {
struct dyld_chained_ptr_arm64e_rebase *p =
(struct dyld_chained_ptr_arm64e_rebase *) &raw_ptr;
event = R_FIXUP_EVENT_REBASE;
delta = p->next;
ptr_value = bin->baddr + (((ut64)p->high8 << 56) | p->target);
}
}
} else if (pointer_format == DYLD_CHAINED_PTR_64_OFFSET) {
stride = 4;
struct dyld_chained_ptr_64_bind *bind =
(struct dyld_chained_ptr_64_bind *) &raw_ptr;
if (bind->bind) {
event = R_FIXUP_EVENT_BIND;
delta = bind->next;
ordinal = bind->ordinal;
addend = bind->addend;
} else {
struct dyld_chained_ptr_64_rebase *p =
(struct dyld_chained_ptr_64_rebase *) &raw_ptr;
event = R_FIXUP_EVENT_REBASE;
delta = p->next;
ptr_value = bin->baddr + (((ut64)p->high8 << 56) | p->target);
}
} else {
eprintf ("Unsupported chained pointer format %d\n", pointer_format);
return;
}
if (cursor >= limit_start && cursor <= limit_end - 8 && (event & event_mask) != 0) {
bool carry_on;
switch (event) {
case R_FIXUP_EVENT_BIND: {
RFixupBindEventDetails event_details;
event_details.type = event;
event_details.bin = bin;
event_details.offset = cursor;
event_details.raw_ptr = raw_ptr;
event_details.ordinal = ordinal;
event_details.addend = addend;
carry_on = callback (context, (RFixupEventDetails *) &event_details);
break;
}
case R_FIXUP_EVENT_BIND_AUTH: {
RFixupBindAuthEventDetails event_details;
event_details.type = event;
event_details.bin = bin;
event_details.offset = cursor;
event_details.raw_ptr = raw_ptr;
event_details.ordinal = ordinal;
event_details.key = key;
event_details.addr_div = addr_div;
event_details.diversity = diversity;
carry_on = callback (context, (RFixupEventDetails *) &event_details);
break;
}
case R_FIXUP_EVENT_REBASE: {
RFixupRebaseEventDetails event_details;
event_details.type = event;
event_details.bin = bin;
event_details.offset = cursor;
event_details.raw_ptr = raw_ptr;
event_details.ptr_value = ptr_value;
carry_on = callback (context, (RFixupEventDetails *) &event_details);
break;
}
case R_FIXUP_EVENT_REBASE_AUTH: {
RFixupRebaseAuthEventDetails event_details;
event_details.type = event;
event_details.bin = bin;
event_details.offset = cursor;
event_details.raw_ptr = raw_ptr;
event_details.ptr_value = ptr_value;
event_details.key = key;
event_details.addr_div = addr_div;
event_details.diversity = diversity;
carry_on = callback (context, (RFixupEventDetails *) &event_details);
break;
}
default:
eprintf ("Unexpected event while iterating chained fixups\n");
carry_on = false;
}
if (!carry_on) {
return;
}
}
cursor += delta * stride;
if (!delta) {
break;
}
}
}
}
}
} | 1234 | True | 1 |
CVE-2022-1052 | False | False | False | False | AV:L/AC:L/Au:N/C:N/I:N/A:P | LOCAL | LOW | NONE | NONE | NONE | PARTIAL | 2.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | LOCAL | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'name': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'name': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-31T18:56Z | 2022-03-24T13:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | pancake | 2022-03-22 16:56:27+01:00 | Fix heap OOB read in macho.iterate_chained_fixups ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer 'tests_65305'
mrmacete:
* Return early if segs_count is 0
* Initialize segs_count also for reconstructed fixups
Co-authored-by: pancake <[email protected]>
Co-authored-by: Francesco Tamagni <[email protected]> | 0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | MACH0_( mach0_free) | MACH0_( mach0_free)( struct MACH0_(obj_t) * mo) | ['mo'] | void *MACH0_(mach0_free)(struct MACH0_(obj_t) *mo) {
if (!mo) {
return NULL;
}
size_t i;
if (mo->symbols) {
for (i = 0; !mo->symbols[i].last; i++) {
free (mo->symbols[i].name);
}
free (mo->symbols);
}
free (mo->segs);
free (mo->sects);
free (mo->symtab);
free (mo->symstr);
free (mo->indirectsyms);
free (mo->imports_by_ord);
ht_pp_free (mo->imports_by_name);
free (mo->dyld_info);
free (mo->toc);
free (mo->modtab);
free (mo->libs);
free (mo->func_start);
free (mo->signature);
free (mo->intrp);
free (mo->compiler);
if (mo->chained_starts) {
for (i = 0; i < mo->nsegs; i++) {
if (mo->chained_starts[i]) {
free (mo->chained_starts[i]->page_start);
free (mo->chained_starts[i]);
}
}
free (mo->chained_starts);
}
r_buf_free (mo->b);
free (mo);
return NULL;
} | 257 | True | 1 |
CVE-2022-1052 | False | False | False | False | AV:L/AC:L/Au:N/C:N/I:N/A:P | LOCAL | LOW | NONE | NONE | NONE | PARTIAL | 2.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | LOCAL | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'name': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'name': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-31T18:56Z | 2022-03-24T13:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | pancake | 2022-03-22 16:56:27+01:00 | Fix heap OOB read in macho.iterate_chained_fixups ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer 'tests_65305'
mrmacete:
* Return early if segs_count is 0
* Initialize segs_count also for reconstructed fixups
Co-authored-by: pancake <[email protected]>
Co-authored-by: Francesco Tamagni <[email protected]> | 0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | parse_chained_fixups | parse_chained_fixups( struct MACH0_(obj_t) * bin , ut32 offset , ut32 size) | ['bin', 'offset', 'size'] | static bool parse_chained_fixups(struct MACH0_(obj_t) *bin, ut32 offset, ut32 size) {
struct dyld_chained_fixups_header header;
if (size < sizeof (header)) {
return false;
}
if (r_buf_fread_at (bin->b, offset, (ut8 *)&header, "7i", 1) != sizeof (header)) {
return false;
}
if (header.fixups_version > 0) {
eprintf ("Unsupported fixups version: %u\n", header.fixups_version);
return false;
}
ut64 starts_at = offset + header.starts_offset;
if (header.starts_offset > size) {
return false;
}
ut32 segs_count;
if ((segs_count = r_buf_read_le32_at (bin->b, starts_at)) == UT32_MAX) {
return false;
}
bin->chained_starts = R_NEWS0 (struct r_dyld_chained_starts_in_segment *, segs_count);
if (!bin->chained_starts) {
return false;
}
bin->fixups_header = header;
bin->fixups_offset = offset;
bin->fixups_size = size;
size_t i;
ut64 cursor = starts_at + sizeof (ut32);
ut64 bsize = r_buf_size (bin->b);
for (i = 0; i < segs_count && cursor + 4 < bsize; i++) {
ut32 seg_off;
if ((seg_off = r_buf_read_le32_at (bin->b, cursor)) == UT32_MAX || !seg_off) {
cursor += sizeof (ut32);
continue;
}
if (i >= bin->nsegs) {
break;
}
struct r_dyld_chained_starts_in_segment *cur_seg = R_NEW0 (struct r_dyld_chained_starts_in_segment);
if (!cur_seg) {
return false;
}
bin->chained_starts[i] = cur_seg;
if (r_buf_fread_at (bin->b, starts_at + seg_off, (ut8 *)cur_seg, "isslis", 1) != 22) {
return false;
}
if (cur_seg->page_count > 0) {
ut16 *page_start = malloc (sizeof (ut16) * cur_seg->page_count);
if (!page_start) {
return false;
}
if (r_buf_fread_at (bin->b, starts_at + seg_off + 22, (ut8 *)page_start, "s", cur_seg->page_count)
!= cur_seg->page_count * 2) {
return false;
}
cur_seg->page_start = page_start;
}
cursor += sizeof (ut32);
}
/* TODO: handle also imports, symbols and multiple starts (32-bit only) */
return true;
} | 420 | True | 1 |
CVE-2022-1052 | False | False | False | False | AV:L/AC:L/Au:N/C:N/I:N/A:P | LOCAL | LOW | NONE | NONE | NONE | PARTIAL | 2.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | LOCAL | LOW | LOW | NONE | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'name': 'https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'name': 'https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}] | 2022-03-31T18:56Z | 2022-03-24T13:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | pancake | 2022-03-22 16:56:27+01:00 | Fix heap OOB read in macho.iterate_chained_fixups ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer 'tests_65305'
mrmacete:
* Return early if segs_count is 0
* Initialize segs_count also for reconstructed fixups
Co-authored-by: pancake <[email protected]>
Co-authored-by: Francesco Tamagni <[email protected]> | 0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_cmd_alias_get | r_cmd_alias_get( RCmd * cmd , const char * k) | ['cmd', 'k'] | R_API RCmdAliasVal *r_cmd_alias_get(RCmd *cmd, const char *k) {
r_return_val_if_fail (cmd && cmd->aliases && k, NULL);
return ht_pp_find(cmd->aliases, k, NULL);
} | 38 | True | 1 |
CVE-2022-1061 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | NONE | NONE | HIGH | 7.5 | HIGH | 3.9 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522', 'name': 'https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7', 'name': 'https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.'}] | 2022-03-31T19:03Z | 2022-03-24T10:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | Sergi Àlvarez i Capilla | 2022-03-24 10:11:29+01:00 | Fix oobread in symbols header parsing ##bin | d4ce40b516ffd70cf2e9e36832d8de139117d522 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | parseDragons | parseDragons( RBinFile * bf , RBuffer * buf , int off , int bits , R_OWN char * file_name) | ['bf', 'buf', 'off', 'bits', 'file_name'] | static RCoreSymCacheElement *parseDragons(RBinFile *bf, RBuffer *buf, int off, int bits, R_OWN char *file_name) {
D eprintf ("Dragons at 0x%x\n", off);
ut64 size = r_buf_size (buf);
if (off >= size) {
return NULL;
}
size -= off;
if (!size) {
return NULL;
}
ut8 *b = malloc (size);
if (!b) {
return NULL;
}
int available = r_buf_read_at (buf, off, b, size);
if (available != size) {
eprintf ("Warning: r_buf_read_at failed\n");
return NULL;
}
#if 0
// after the list of sections, there's a bunch of unknown
// data, brobably dwords, and then the same section list again
// this function aims to parse it.
0x00000138 |1a2b b2a1 0300 0000 1a2b b2a1 e055 0000| .+.......+...U..
n_segments ----. .--- how many sections ?
0x00000148 |0100 0000 ca55 0000 0400 0000 1800 0000| .....U..........
.---- how many symbols? 0xc7
0x00000158 |c700 0000 0000 0000 0000 0000 0104 0000| ................
0x00000168 |250b e803 0000 0100 0000 0000 bd55 0000| %............U..
0x00000178 |91bb e903 e35a b42c 93a4 340a 8746 9489| .....Z.,..4..F..
0x00000188 |0cea 4c40 0c00 0000 0900 0000 0000 0000| ..L@............
0x00000198 |0000 0000 0000 0000 0000 0000 0000 0000| ................
0x000001a8 |0080 0000 0000 0000 5f5f 5445 5854 0000| ........__TEXT..
0x000001b8 |0000 0000 0000 0000 0080 0000 0000 0000| ................
0x000001c8 |0040 0000 0000 0000 5f5f 4441 5441 0000| .@......__DATA..
0x000001d8 |0000 0000 0000 0000 00c0 0000 0000 0000| ................
0x000001e8 |0000 0100 0000 0000 5f5f 4c4c 564d 0000| ........__LLVM..
0x000001f8 |0000 0000 0000 0000 00c0 0100 0000 0000| ................
0x00000208 |00c0 0000 0000 0000 5f5f 4c49 4e4b 4544| ........__LINKED
0x00000218 |4954 0000 0000 0000 0000 0000 d069 0000| IT...........i..
#endif
// eprintf ("Dragon's magic:\n");
int magicCombo = 0;
if (!memcmp ("\x1a\x2b\xb2\xa1", b, 4)) { // 0x130 ?
magicCombo++;
}
if (!memcmp ("\x1a\x2b\xb2\xa1", b + 8, 4)) {
magicCombo++;
}
if (magicCombo != 2) {
// hack for C22F7494
available = r_buf_read_at (buf, off - 8, b, size);
if (available != size) {
eprintf ("Warning: r_buf_read_at failed\n");
return NULL;
}
if (!memcmp ("\x1a\x2b\xb2\xa1", b, 4)) { // 0x130 ?
off -= 8;
} else {
eprintf ("0x%08x parsing error: invalid magic retry\n", off);
}
}
D eprintf ("0x%08x magic OK\n", off);
D {
const int e0ss = r_read_le32 (b + 12);
eprintf ("0x%08x eoss 0x%x\n", off + 12, e0ss);
}
free (b);
return r_coresym_cache_element_new (bf, buf, off + 16, bits, file_name);
} | 572 | True | 1 |
CVE-2022-1207 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:N/A:N | NETWORK | MEDIUM | NONE | PARTIAL | NONE | NONE | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | LOW | LOW | 6.6 | MEDIUM | 1.8 | 4.7 | False | [{'url': 'https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1', 'name': 'https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb', 'name': 'https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-125'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.'}] | 2022-04-08T16:53Z | 2022-04-01T19:15Z | Out-of-bounds Read | The software reads data past the end, or before the beginning, of the intended buffer. | Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/125.html | 0 | pancake | 2022-04-01 21:03:24+02:00 | Fix 1 byte oobread in the cris analysis plugin ##crash | 605785b65dd356d46d4487faa41dbf90943b8bc1 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | analop | analop( RAnal * a , RAnalOp * op , ut64 addr , const ut8 * buf , int len , RAnalOpMask mask) | ['a', 'op', 'addr', 'buf', 'len', 'mask'] | static int analop(RAnal *a, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnalOpMask mask) {
int opsize = -1;
op->type = -1;
opsize = 2;
switch (buf[0]) {
case 0x3f:
case 0x4f:
op->type = R_ANAL_OP_TYPE_MOV;
opsize = 4;
break;
case 0x6f:
op->type = R_ANAL_OP_TYPE_MOV;
opsize = 6;
break;
case 0x7f:
op->type = R_ANAL_OP_TYPE_LEA;
if (len > 5) {
op->ptr = buf[2];
op->ptr |= buf[3]<<8;
op->ptr |= buf[4]<<16;
op->ptr |= ((ut32)(0xff&buf[5]))<<24;
op->ptr += addr;
opsize = 6;
} else {
// error
op->ptr = UT64_MAX;
}
break;
case 0xbf: // bsr
op->type = R_ANAL_OP_TYPE_CALL;
if (len > 5) {
st32 delta = buf[2];
delta |= buf[3]<<8;
delta |= buf[4]<<16;
delta |= buf[5]<<24;
op->jump = addr + delta;
} else {
op->jump = UT64_MAX;
}
op->fail = addr + 6;
opsize = 6;
break;
case 0x00:
if (buf[1] == 0x00) {
op->type = R_ANAL_OP_TYPE_TRAP;
} else {
op->type = R_ANAL_OP_TYPE_JMP;
{
st8 delta = buf[0];
op->jump = addr + delta;
}
}
break;
case 0xf0:
if (buf[1]==0xb9) {
op->type = R_ANAL_OP_TYPE_RET;
}
break;
default:
switch (buf[1]) {
case 0x00:
op->type = R_ANAL_OP_TYPE_CJMP; // BCC
break;
case 0xf3:
op->type = R_ANAL_OP_TYPE_SHR;
break;
case 0x96: // move.d r, r
if (buf[0] >=0xc0) {
op->type = R_ANAL_OP_TYPE_CMP;
} else {
op->type = R_ANAL_OP_TYPE_MOV;
}
break;
case 0xf2:
case 0x0b:
case 0x72:
op->type = R_ANAL_OP_TYPE_CMP;
break;
case 0x05:
if (buf[0] == 0xb0) {
op->type = R_ANAL_OP_TYPE_NOP;
}
break;
case 0x01:
case 0x02:
case 0xc2:
case 0xf5:
case 0x91:
case 0x41:
case 0x61:
case 0x65:
op->type = R_ANAL_OP_TYPE_ADD;
break;
case 0x12:
case 0xf6:
case 0xe2:
op->type = R_ANAL_OP_TYPE_SUB;
break;
case 0x82: // moveq i, r
case 0xba: // move.d [r], r
case 0xeb: // move.d r, [r]
case 0xc6: // move.d r, r
case 0x92: // moveq i, r
case 0x9b: // move.d i, r
case 0xbe: // move [sp+], srp
case 0x06:
case 0x26:
case 0xfb:
case 0x9a:
case 0xb2:
case 0xda:
case 0x2b:
case 0x6f:
case 0xa2:
case 0x2f:
case 0x8b:
case 0x1b:
case 0xaa:
case 0xa6:
case 0xb6:
op->type = R_ANAL_OP_TYPE_MOV;
break;
case 0xe0:
op->type = R_ANAL_OP_TYPE_JMP;
{
st8 delta = buf[0];
op->jump = addr + delta;
}
break;
case 0x10:
case 0x30:
case 0x20:
case 0x2d:
op->type = R_ANAL_OP_TYPE_CJMP;
op->jump = addr + buf[0];
op->fail = addr + 2; // delay slot here?
break;
case 0xbf:
op->type = R_ANAL_OP_TYPE_CALL; // bsr
break;
case 0xb9:
op->type = R_ANAL_OP_TYPE_UJMP; // jsr reg
break;
}
}
#if 0
switch (*buf) {
case 0x3f: // adds.w N, R
opsize = 4;
case 0x01:
case 0x53: // addi, acr.w, r3, acr
case 0x04:
case 0x61:
case 0x62:
case 0x63:
op->type = R_ANAL_OP_TYPE_ADD;
break;
case 0x88:
case 0x84:
case 0x81:
case 0x8c:
case 0xad:
op->type = R_ANAL_OP_TYPE_SUB;
break;
case 0x7f: // lapc <addr>, <reg>
op->type = R_ANAL_OP_TYPE_LEA;
break;
case 0xcf:
case 0xbe:
case 0x60:
case 0x6f:
case 0x6a: // move.d reg, reg
case 0x7e:
case 0xfe:
op->type = R_ANAL_OP_TYPE_MOV;
break;
case 0x00:
op->type = R_ANAL_OP_TYPE_JMP;
// jsr acr
break;
case 0xff:
opsize = 6;
case 0x14:
case 0x0e:
case 0x1a:
case 0x9c:
case 0x6d: // bne
op->type = R_ANAL_OP_TYPE_CJMP;
// jsr acr
break;
case 0xbf:
opsize = 6;
case 0xb1:
case 0xb2:
case 0xb3:
case 0xb4:
case 0xb5:
case 0xb6:
case 0xb7:
case 0xb8:
case 0xb9:
op->type = R_ANAL_OP_TYPE_UJMP;
// jsr acr
break;
case 0x8f: // test.b [acr]
case 0xc0:
case 0xe1:
case 0xaa:
op->type = R_ANAL_OP_TYPE_CMP;
break;
default:
switch (*w) {
case 0xb0b9: //// jsr r0
op->type = R_ANAL_OP_TYPE_CJMP;
break;
case 0xb005:
case 0x05b0:
op->type = R_ANAL_OP_TYPE_NOP;
break;
case 0xf0b9:
case 0xb9f0:
op->type = R_ANAL_OP_TYPE_RET;
break;
default:
op->type = R_ANAL_OP_TYPE_MOV;
break;
}
}
#endif
op->size = opsize;
//op->delay = 1;
return opsize;
} | 923 | True | 1 |
CVE-2022-1240 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc', 'name': 'https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Issue Tracking', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4', 'name': 'https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-787'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndIncluding': '5.6.6', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}] | 2022-04-14T18:10Z | 2022-04-06T11:15Z | Out-of-bounds Write | The software writes data past the end, or before the beginning, of the intended buffer. | Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
| https://cwe.mitre.org/data/definitions/787.html | 0 | pancake | 2022-04-05 11:52:32+02:00 | Fix oobread in the macho parser ##crash
* Reported by @Han0nly via huntr.dev
* Reproducers: heapoverflow1
* BountyID: e589bd97-4c74-4e79-93b5-0951a281facc | ca8d8b39f3e34a4fd943270330b80f1148129de4 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | parse_relocation_info | parse_relocation_info( struct MACH0_(obj_t) * bin , RSkipList * relocs , ut32 offset , ut32 num) | ['bin', 'relocs', 'offset', 'num'] | static void parse_relocation_info(struct MACH0_(obj_t) *bin, RSkipList *relocs, ut32 offset, ut32 num) {
if (!num || !offset || (st32)num < 0) {
return;
}
ut64 total_size = num * sizeof (struct relocation_info);
if (offset > bin->size) {
return;
}
if (total_size > bin->size) {
total_size = bin->size - offset;
num = total_size /= sizeof (struct relocation_info);
}
struct relocation_info *info = calloc (num, sizeof (struct relocation_info));
if (!info) {
return;
}
if (r_buf_read_at (bin->b, offset, (ut8 *) info, total_size) < total_size) {
free (info);
return;
}
size_t i;
for (i = 0; i < num; i++) {
struct relocation_info a_info = info[i];
ut32 sym_num = a_info.r_symbolnum;
if (sym_num > bin->nsymtab) {
continue;
}
ut32 stridx = bin->symtab[sym_num].n_strx;
char *sym_name = get_name (bin, stridx, false);
if (!sym_name) {
continue;
}
struct reloc_t *reloc = R_NEW0 (struct reloc_t);
if (!reloc) {
free (info);
free (sym_name);
return;
}
reloc->addr = offset_to_vaddr (bin, a_info.r_address);
reloc->offset = a_info.r_address;
reloc->ord = sym_num;
reloc->type = a_info.r_type; // enum RelocationInfoType
reloc->external = a_info.r_extern;
reloc->pc_relative = a_info.r_pcrel;
reloc->size = a_info.r_length;
r_str_ncpy (reloc->name, sym_name, sizeof (reloc->name) - 1);
r_skiplist_insert (relocs, reloc);
free (sym_name);
}
free (info);
} | 352 | True | 1 |
CVE-2022-1237 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'name': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'name': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-129'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}] | 2022-04-14T14:40Z | 2022-04-06T10:15Z | Improper Validation of Array Index | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. | https://cwe.mitre.org/data/definitions/129.html | 0 | pancake | 2022-04-05 11:31:24+02:00 | Fix oobread segfaults in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: seed1 seed2
* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 | 2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | __init | __init( RBuffer * buf , r_bin_ne_obj_t * bin) | ['buf', 'bin'] | void __init(RBuffer *buf, r_bin_ne_obj_t *bin) {
bin->header_offset = r_buf_read_le16_at (buf, 0x3c);
bin->ne_header = R_NEW0 (NE_image_header);
if (!bin->ne_header) {
return;
}
bin->buf = buf;
r_buf_read_at (buf, bin->header_offset, (ut8 *)bin->ne_header, sizeof (NE_image_header));
bin->alignment = 1 << bin->ne_header->FileAlnSzShftCnt;
if (!bin->alignment) {
bin->alignment = 1 << 9;
}
bin->os = __get_target_os (bin);
ut16 offset = bin->ne_header->SegTableOffset + bin->header_offset;
ut16 size = bin->ne_header->SegCount * sizeof (NE_image_segment_entry);
bin->segment_entries = calloc (1, size);
if (!bin->segment_entries) {
return;
}
r_buf_read_at (buf, offset, (ut8 *)bin->segment_entries, size);
bin->entry_table = calloc (1, bin->ne_header->EntryTableLength);
r_buf_read_at (buf, (ut64)bin->header_offset + bin->ne_header->EntryTableOffset, bin->entry_table, bin->ne_header->EntryTableLength);
bin->imports = r_bin_ne_get_imports (bin);
__ne_get_resources (bin);
} | 234 | True | 1 |
|
CVE-2022-1237 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'name': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'name': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-129'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}] | 2022-04-14T14:40Z | 2022-04-06T10:15Z | Improper Validation of Array Index | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. | https://cwe.mitre.org/data/definitions/129.html | 0 | pancake | 2022-04-05 11:31:24+02:00 | Fix oobread segfaults in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: seed1 seed2
* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 | 2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_ne_get_relocs | r_bin_ne_get_relocs( r_bin_ne_obj_t * bin) | ['bin'] | RList *r_bin_ne_get_relocs(r_bin_ne_obj_t *bin) {
RList *segments = bin->segments;
if (!segments) {
return NULL;
}
RList *entries = bin->entries;
if (!entries) {
return NULL;
}
RList *symbols = bin->symbols;
if (!symbols) {
return NULL;
}
ut16 *modref = malloc (bin->ne_header->ModRefs * sizeof (ut16));
if (!modref) {
return NULL;
}
r_buf_read_at (bin->buf, (ut64)bin->ne_header->ModRefTable + bin->header_offset, (ut8 *)modref, bin->ne_header->ModRefs * sizeof (ut16));
RList *relocs = r_list_newf (free);
if (!relocs) {
free (modref);
return NULL;
}
RListIter *it;
RBinSection *seg;
int index = -1;
r_list_foreach (segments, it, seg) {
index++;
if (!(bin->segment_entries[index].flags & RELOCINFO)) {
continue;
}
ut32 off, start = off = seg->paddr + seg->size;
ut16 length = r_buf_read_le16_at (bin->buf, off);
if (!length) {
continue;
}
off += 2;
while (off < start + length * sizeof (NE_image_reloc_item)) {
RBinReloc *reloc = R_NEW0 (RBinReloc);
if (!reloc) {
return NULL;
}
NE_image_reloc_item rel;
r_buf_read_at (bin->buf, off, (ut8 *)&rel, sizeof (rel));
reloc->paddr = seg->paddr + rel.offset;
switch (rel.type) {
case LOBYTE:
reloc->type = R_BIN_RELOC_8;
break;
case SEL_16:
case OFF_16:
reloc->type = R_BIN_RELOC_16;
break;
case POI_32:
case OFF_32:
reloc->type = R_BIN_RELOC_32;
break;
case POI_48:
reloc->type = R_BIN_RELOC_64;
break;
}
ut32 offset;
if (rel.flags & (IMPORTED_ORD | IMPORTED_NAME)) {
RBinImport *imp = R_NEW0 (RBinImport);
if (!imp) {
free (reloc);
break;
}
char *name;
if (rel.index > bin->ne_header->ModRefs) {
name = r_str_newf ("UnknownModule%d_%x", rel.index, off); // ????
} else {
offset = modref[rel.index - 1] + bin->header_offset + bin->ne_header->ImportNameTable;
name = __read_nonnull_str_at (bin->buf, offset);
}
if (rel.flags & IMPORTED_ORD) {
imp->ordinal = rel.func_ord;
imp->name = r_str_newf ("%s.%s", name, __func_name_from_ord(name, rel.func_ord));
} else {
offset = bin->header_offset + bin->ne_header->ImportNameTable + rel.name_off;
char *func = __read_nonnull_str_at (bin->buf, offset);
imp->name = r_str_newf ("%s.%s", name, func);
free (func);
}
free (name);
reloc->import = imp;
} else if (rel.flags & OSFIXUP) {
// TODO
} else {
if (strstr (seg->name, "FIXED")) {
RBinSection *s = r_list_get_n (segments, rel.segnum - 1);
if (s) {
offset = s->paddr + rel.segoff;
} else {
offset = -1;
}
} else {
RBinAddr *entry = r_list_get_n (entries, rel.entry_ordinal - 1);
if (entry) {
offset = entry->paddr;
} else {
offset = -1;
}
}
reloc->addend = offset;
RBinSymbol *sym = NULL;
RListIter *sit;
r_list_foreach (symbols, sit, sym) {
if (sym->paddr == reloc->addend) {
reloc->symbol = sym;
break;
}
}
}
if (rel.flags & ADDITIVE) {
reloc->additive = 1;
r_list_append (relocs, reloc);
} else {
do {
r_list_append (relocs, reloc);
offset = r_buf_read_le16_at (bin->buf, reloc->paddr);
RBinReloc *tmp = reloc;
reloc = R_NEW0 (RBinReloc);
if (!reloc) {
break;
}
*reloc = *tmp;
reloc->paddr = seg->paddr + offset;
} while (offset != 0xFFFF);
free (reloc);
}
off += sizeof (NE_image_reloc_item);
}
}
free (modref);
return relocs;
} | 835 | True | 1 |
|
CVE-2022-1237 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'name': 'https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'name': 'https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-129'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}] | 2022-04-14T14:40Z | 2022-04-06T10:15Z | Improper Validation of Array Index | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. | https://cwe.mitre.org/data/definitions/129.html | 0 | pancake | 2022-04-05 11:31:24+02:00 | Fix oobread segfaults in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: seed1 seed2
* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 | 2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_ne_get_segments | r_bin_ne_get_segments( r_bin_ne_obj_t * bin) | ['bin'] | RList *r_bin_ne_get_segments(r_bin_ne_obj_t *bin) {
int i;
if (!bin) {
return NULL;
}
RList *segments = r_list_newf (free);
for (i = 0; i < bin->ne_header->SegCount; i++) {
RBinSection *bs = R_NEW0 (RBinSection);
NE_image_segment_entry *se = &bin->segment_entries[i];
if (!bs) {
return segments;
}
bs->size = se->length;
bs->vsize = se->minAllocSz ? se->minAllocSz : 64000;
bs->bits = R_SYS_BITS_16;
bs->is_data = se->flags & IS_DATA;
bs->perm = __translate_perms (se->flags);
bs->paddr = (ut64)se->offset * bin->alignment;
bs->name = r_str_newf ("%s.%" PFMT64d, se->flags & IS_MOVEABLE ? "MOVEABLE" : "FIXED", bs->paddr);
bs->is_segment = true;
r_list_append (segments, bs);
}
bin->segments = segments;
return segments;
} | 190 | True | 1 |
|
CVE-2022-1238 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 7.8 | HIGH | 1.8 | 5.9 | False | [{'url': 'https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778', 'name': 'https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200', 'name': 'https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-805'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}] | 2022-04-14T14:45Z | 2022-04-06T10:15Z | Buffer Access with Incorrect Length Value | The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | When the length value exceeds the size of the destination, a buffer overflow could occur.
| https://cwe.mitre.org/data/definitions/805.html | 0 | pancake | 2022-04-05 11:44:46+02:00 | Fix another oobread segfault in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: sample1 sample2 sample3
* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 | c40a4f9862104ede15d0ba05ccbf805923070778 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_ne_get_entrypoints | r_bin_ne_get_entrypoints( r_bin_ne_obj_t * bin) | ['bin'] | RList *r_bin_ne_get_entrypoints(r_bin_ne_obj_t *bin) {
RList *entries = r_list_newf (free);
if (!entries) {
return NULL;
}
RBinAddr *entry;
RList *segments = r_bin_ne_get_segments (bin);
if (!segments) {
r_list_free (entries);
return NULL;
}
if (bin->ne_header->csEntryPoint) {
entry = R_NEW0 (RBinAddr);
if (!entry) {
r_list_free (entries);
return NULL;
}
entry->bits = 16;
RBinSection *s = r_list_get_n (segments, bin->ne_header->csEntryPoint - 1);
entry->paddr = bin->ne_header->ipEntryPoint + (s? s->paddr: 0);
r_list_append (entries, entry);
}
int off = 0;
while (off < bin->ne_header->EntryTableLength) {
ut8 bundle_length = *(ut8 *)(bin->entry_table + off);
if (!bundle_length) {
break;
}
off++;
ut8 bundle_type = *(ut8 *)(bin->entry_table + off);
off++;
int i;
for (i = 0; i < bundle_length; i++) {
entry = R_NEW0 (RBinAddr);
if (!entry) {
r_list_free (entries);
return NULL;
}
off++;
if (!bundle_type) { // Skip
off--;
free (entry);
break;
} else if (bundle_type == 0xFF) { // Moveable
off += 2;
ut8 segnum = *(bin->entry_table + off);
off++;
ut16 segoff = *(ut16 *)(bin->entry_table + off);
entry->paddr = (ut64)bin->segment_entries[segnum - 1].offset * bin->alignment + segoff;
} else { // Fixed
entry->paddr = (ut64)bin->segment_entries[bundle_type - 1].offset * bin->alignment + *(ut16 *)(bin->entry_table + off);
}
off += 2;
r_list_append (entries, entry);
}
}
r_list_free (segments);
bin->entries = entries;
return entries;
} | 392 | True | 1 |
CVE-2022-1244 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3', 'name': 'https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82', 'name': 'https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-122'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}] | 2022-04-15T18:28Z | 2022-04-05T19:15Z | Heap-based Buffer Overflow | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). | https://cwe.mitre.org/data/definitions/122.html | 0 | pancake | 2022-04-05 19:39:26+02:00 | Fix oobread in dyldcache ##crash
* Reported by @hdthky via huntr.dev
* Reproducers: poc1
* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 | 2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | create_cache_bins | create_cache_bins( RBinFile * bf , RDyldCache * cache) | ['bf', 'cache'] | static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) {
RList *bins = r_list_newf ((RListFree)free_bin);
ut16 *depArray = NULL;
cache_imgxtr_t *extras = NULL;
if (!bins) {
return NULL;
}
char *target_libs = NULL;
RList *target_lib_names = NULL;
int *deps = NULL;
target_libs = r_sys_getenv ("R_DYLDCACHE_FILTER");
if (target_libs) {
target_lib_names = r_str_split_list (target_libs, ":", 0);
if (!target_lib_names) {
r_list_free (bins);
return NULL;
}
deps = R_NEWS0 (int, cache->hdr->imagesCount);
if (!deps) {
r_list_free (bins);
r_list_free (target_lib_names);
return NULL;
}
}
ut32 i;
for (i = 0; i < cache->n_hdr; i++) {
cache_hdr_t *hdr = &cache->hdr[i];
ut64 hdr_offset = cache->hdr_offset[i];
ut32 maps_index = cache->maps_index[i];
cache_img_t *img = read_cache_images (cache->buf, hdr, hdr_offset);
if (!img) {
goto next;
}
ut32 j;
if (target_libs) {
HtPU *path_to_idx = NULL;
if (cache->accel) {
depArray = R_NEWS0 (ut16, cache->accel->depListCount);
if (!depArray) {
goto next;
}
if (r_buf_fread_at (cache->buf, cache->accel->depListOffset, (ut8*) depArray, "s", cache->accel->depListCount) != cache->accel->depListCount * 2) {
goto next;
}
extras = read_cache_imgextra (cache->buf, hdr, cache->accel);
if (!extras) {
goto next;
}
} else {
path_to_idx = create_path_to_index (cache->buf, img, hdr);
}
for (j = 0; j < hdr->imagesCount; j++) {
bool printing = !deps[j];
char *lib_name = get_lib_name (cache->buf, &img[j]);
if (!lib_name) {
break;
}
if (strstr (lib_name, "libobjc.A.dylib")) {
deps[j]++;
}
if (!r_list_find (target_lib_names, lib_name, string_contains)) {
R_FREE (lib_name);
continue;
}
if (printing) {
eprintf ("FILTER: %s\n", lib_name);
}
R_FREE (lib_name);
deps[j]++;
if (extras && depArray) {
ut32 k;
for (k = extras[j].dependentsStartArrayIndex; depArray[k] != 0xffff; k++) {
ut16 dep_index = depArray[k] & 0x7fff;
deps[dep_index]++;
char *dep_name = get_lib_name (cache->buf, &img[dep_index]);
if (!dep_name) {
break;
}
if (printing) {
eprintf ("-> %s\n", dep_name);
}
free (dep_name);
}
} else if (path_to_idx) {
carve_deps_at_address (cache, img, path_to_idx, img[j].address, deps, printing);
}
}
ht_pu_free (path_to_idx);
R_FREE (depArray);
R_FREE (extras);
}
for (j = 0; j < hdr->imagesCount; j++) {
if (deps && !deps[j]) {
continue;
}
ut64 pa = va2pa (img[j].address, hdr->mappingCount, &cache->maps[maps_index], cache->buf, 0, NULL, NULL);
if (pa == UT64_MAX) {
continue;
}
ut8 magicbytes[4];
r_buf_read_at (cache->buf, pa, magicbytes, 4);
int magic = r_read_le32 (magicbytes);
switch (magic) {
case MH_MAGIC_64:
{
char file[256];
RDyldBinImage *bin = R_NEW0 (RDyldBinImage);
if (!bin) {
goto next;
}
bin->header_at = pa;
bin->hdr_offset = hdr_offset;
bin->symbols_off = resolve_symbols_off (cache, pa);
bin->va = img[j].address;
if (r_buf_read_at (cache->buf, img[j].pathFileOffset, (ut8*) &file, sizeof (file)) == sizeof (file)) {
file[255] = 0;
char *last_slash = strrchr (file, '/');
if (last_slash && *last_slash) {
if (last_slash > file) {
char *scan = last_slash - 1;
while (scan > file && *scan != '/') {
scan--;
}
if (*scan == '/') {
bin->file = strdup (scan + 1);
} else {
bin->file = strdup (last_slash + 1);
}
} else {
bin->file = strdup (last_slash + 1);
}
} else {
bin->file = strdup (file);
}
}
r_list_append (bins, bin);
break;
}
default:
eprintf ("Unknown sub-bin\n");
break;
}
}
next:
R_FREE (depArray);
R_FREE (extras);
R_FREE (img);
}
if (r_list_empty (bins)) {
r_list_free (bins);
bins = NULL;
}
R_FREE (deps);
R_FREE (target_libs);
r_list_free (target_lib_names);
return bins;
} | 990 | True | 1 |
|
CVE-2022-1283 | False | False | False | True | AV:N/AC:M/Au:N/C:N/I:N/A:P | NETWORK | MEDIUM | NONE | NONE | NONE | PARTIAL | 4.3 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | LOCAL | LOW | NONE | REQUIRED | UNCHANGED | NONE | NONE | HIGH | 5.5 | MEDIUM | 1.8 | 3.6 | False | [{'url': 'https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013', 'name': 'https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Patch', 'Third Party Advisory']}, {'url': 'https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67', 'name': 'https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-476'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*', 'versionEndExcluding': '5.6.8', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).'}] | 2022-04-15T15:28Z | 2022-04-08T18:15Z | NULL Pointer Dereference | A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. | NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
| https://cwe.mitre.org/data/definitions/476.html | 0 | Sergi Àlvarez i Capilla | 2022-04-08 19:49:21+02:00 | Fix null deref in the ne parser ##crash
* Reported by @hmsec via huntr.dev
* Reproducer: nepoc00
* BountyID: bfeb8fb8-644d-4587-80d4-cb704c404013 | 18d1d064bf599a255d55f09fca3104776fc34a67 | False | radareorg/radare2 | UNIX-like reverse engineering framework and command-line toolset | 2012-07-03 07:42:26 | 2022-08-24 23:09:24 | https://www.radare.org/ | radareorg | 16739.0 | 2722.0 | r_bin_ne_get_symbols | r_bin_ne_get_symbols( r_bin_ne_obj_t * bin) | ['bin'] | RList *r_bin_ne_get_symbols(r_bin_ne_obj_t *bin) {
RBinSymbol *sym;
ut16 off = bin->ne_header->ResidNamTable + bin->header_offset;
RList *symbols = r_list_newf (free);
if (!symbols) {
return NULL;
}
RList *entries = r_bin_ne_get_entrypoints (bin);
bool resident = true, first = true;
while (true) {
ut8 sz = r_buf_read8_at (bin->buf, off);
if (!sz) {
first = true;
if (resident) {
resident = false;
off = bin->ne_header->OffStartNonResTab;
sz = r_buf_read8_at (bin->buf, off);
if (!sz) {
break;
}
} else {
break;
}
}
char *name = malloc ((ut64)sz + 1);
if (!name) {
break;
}
off++;
r_buf_read_at (bin->buf, off, (ut8 *)name, sz);
name[sz] = '\0';
off += sz;
sym = R_NEW0 (RBinSymbol);
if (!sym) {
break;
}
sym->name = name;
if (!first) {
sym->bind = R_BIN_BIND_GLOBAL_STR;
}
ut16 entry_off = r_buf_read_le16_at (bin->buf, off);
off += 2;
RBinAddr *entry = r_list_get_n (entries, entry_off);
if (entry) {
sym->paddr = entry->paddr;
} else {
sym->paddr = -1;
}
sym->ordinal = entry_off;
r_list_append (symbols, sym);
first = false;
}
RListIter *it;
RBinAddr *en;
int i = 1;
r_list_foreach (entries, it, en) {
if (!r_list_find (symbols, &en->paddr, __find_symbol_by_paddr)) {
sym = R_NEW0 (RBinSymbol);
if (!sym) {
break;
}
sym->name = r_str_newf ("entry%d", i - 1);
sym->paddr = en->paddr;
sym->bind = R_BIN_BIND_GLOBAL_STR;
sym->ordinal = i;
r_list_append (symbols, sym);
}
i++;
}
bin->symbols = symbols;
return symbols;
} | 399 | True | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.