SB20260425202 - Multiple vulnerabilities in Ghidra



SB20260425202 - Multiple vulnerabilities in Ghidra

Published: April 25, 2026

Security Bulletin ID SB20260425202
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to uncontrolled resource consumption in the rust_demangle() function in the GPL/DemanglerGnu component when parsing crafted Rust symbol names during binary analysis. A remote attacker can supply a malicious binary with crafted Rust symbol names to cause a denial of service.

A small crafted input can trigger unbounded memory allocation and crash Ghidra during analysis.


2) OS Command Injection (CVE-ID: CVE-2026-4946)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper neutralization of special elements used in an os command in the @execute annotation handler when parsing binary-derived comments in the Listing view. A remote attacker can embed a crafted {@execute ...} annotation in a malicious binary to execute arbitrary code.

User interaction is required to click an auto-generated comment extracted from analyzed Mach-O CFString data.


Remediation

Install update from vendor's website.