First published: Mon Dec 09 2019(Updated: )
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Radare2 | <=4.0.0 | |
Fedora | =30 | |
Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19647 is classified as high due to the potential for arbitrary write operations and denial of service.
To fix CVE-2019-19647, upgrade radare2 to version 4.0.1 or later, or apply available patches provided by the software maintainers.
CVE-2019-19647 affects radare2 versions up to and including 4.0.0.
Yes, CVE-2019-19647 allows remote attackers to exploit the vulnerability via crafted input, potentially causing application crashes.
CVE-2019-19647 is classified as an arbitrary write vulnerability due to insufficient validation in the affected software.