Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3r39-mw8c-6g5f

Опубликовано: 17 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 4.8
CVSS3: 3.3

Описание

A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.

A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.

EPSS

Процентиль: 23%
0.00077
Низкий

4.8 Medium

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 3.3
ubuntu
12 месяцев назад

A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.

CVSS3: 3.3
nvd
12 месяцев назад

A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component.

CVSS3: 3.3
debian
12 месяцев назад

A vulnerability, which was classified as problematic, was found in rad ...

suse-cvrf
12 месяцев назад

Security update for radare2

EPSS

Процентиль: 23%
0.00077
Низкий

4.8 Medium

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119