First published: Fri Jul 07 2023(Updated: )
Radare2 has a use-after-free vulnerability in pyc parser's get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Radare Radare2 | =5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-32495.
The title of the vulnerability is 'Radare2 has a use-after-free vulnerability in pyc parser s get_none_object function.'
The severity of CVE-2021-32495 is critical with a CVSS score of 9.1.
The vulnerability in Radare2 occurs due to a use-after-free vulnerability in the pyc parser's get_none_object function.
The vulnerability allows attackers to read freed memory, which can lead to a denial of service (DoS) attack.