First published: Fri Apr 22 2022(Updated: )
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
radare2 | <5.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1437 is a heap-based buffer overflow vulnerability in the GitHub repository radareorg/radare2 prior to version 5.7.0.
The severity of CVE-2022-1437 is high, with a severity value of 7.1.
CVE-2022-1437 causes the program to read data past the end of the intended buffer, which can allow attackers to read sensitive information from other memory locations or cause a crash.
To fix CVE-2022-1437, you should update the radareorg/radare2 repository to version 5.7.0 or above.
Yes, you can find references about CVE-2022-1437 at the following links: [Link 1](https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136) and [Link 2](https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038).