First published: Wed Apr 06 2022(Updated: )
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Radare Radare2 | <=5.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-1240.
The severity of CVE-2022-1240 is high (7.8).
The software affected by CVE-2022-1240 is Radare Radare2 version up to 5.6.6.
If address sanitizer is disabled during the compiling process, a heap buffer overflow can occur.
Yes, CVE-2022-1240 is likely to be exploitable.