Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-19590

Опубликовано: 05 дек. 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
Версия до 4.0.0 (включая)

EPSS

Процентиль: 86%
0.03052
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-190

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.

CVSS3: 7.8
debian
около 6 лет назад

In radare2 through 4.0, there is an integer overflow for the variable ...

github
больше 3 лет назад

In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.

EPSS

Процентиль: 86%
0.03052
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-190