First published: Wed Jun 13 2018(Updated: )
There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Radare2 | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12321 is classified as high due to the potential exploitation of a heap out of bounds read.
To fix CVE-2018-12321, upgrade to a version of radare2 that is newer than 2.6.0.
The impact of CVE-2018-12321 includes potential denial of service and information disclosure when handling crafted Java binary files.
Users of radare2 version 2.6.0 are affected by CVE-2018-12321.
CVE-2018-12321 involves the java_switch_op() function within libr/anal/p/anal_java.c in the radare2 software.