First published: Sun Apr 24 2022(Updated: )
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Radare2 | <5.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1452 is an out-of-bounds read vulnerability in the r_bin_java_bootstrap_methods_attr_new function in the radareorg/radare2 GitHub repository prior to version 5.7.0.
The severity of CVE-2022-1452 is high, with a CVSS score of 7.1.
CVE-2022-1452 allows attackers to read sensitive information from other memory locations or cause other impact.
CVE-2022-1452 affects Radare Radare2 versions up to exclusive version 5.7.0.
To fix CVE-2022-1452, users should upgrade their Radare Radare2 installation to version 5.7.0 or later.