First published: Wed Jun 13 2018(Updated: )
There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
radare2 | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12320 is rated as a high-severity vulnerability due to its potential for exploitation in crafted Java binary files.
To fix CVE-2018-12320, upgrade radare2 to version 2.6.1 or later where the vulnerability is addressed.
CVE-2018-12320 can lead to memory corruption issues that may be exploited by attackers to execute arbitrary code.
CVE-2018-12320 affects radare2 version 2.6.0.
CVE-2018-12320 is considered a local vulnerability as it requires an attacker to have access to the affected system to exploit it.