SB2018061322 - Multiple vulnerabilities in Radare radare2
Published: June 13, 2018 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2018-12320)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file.
2) Out-of-bounds read (CVE-ID: CVE-2018-12321)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file.
3) Out-of-bounds read (CVE-ID: CVE-2018-12322)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file.
Remediation
Install update from vendor's website.
References
- https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548
- https://github.com/radare/radare2/issues/10293
- https://github.com/radare/radare2/commit/224e6bc13fa353dd3b7f7a2334588f1c4229e58d
- https://github.com/radare/radare2/issues/10296
- https://github.com/radare/radare2/commit/bbb4af56003c1afdad67af0c4339267ca38b1017
- https://github.com/radare/radare2/issues/10294