The get_relocs_64 function in libr/bin/format/mach0/mach0.c in radare2 1.3.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted Mach0 file.
References
Link | Resource |
---|---|
https://github.com/radare/radare2/commit/d1e8ac62c6d978d4662f69116e30230d43033c92 | Issue Tracking Patch Third Party Advisory |
https://github.com/radare/radare2/issues/7301 | Issue Tracking Patch Third Party Advisory |
https://github.com/radare/radare2/commit/d1e8ac62c6d978d4662f69116e30230d43033c92 | Issue Tracking Patch Third Party Advisory |
https://github.com/radare/radare2/issues/7301 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/radare/radare2/commit/d1e8ac62c6d978d4662f69116e30230d43033c92 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/radare/radare2/issues/7301 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-04-18 20:59
Updated : 2024-11-21 03:33
NVD link : CVE-2017-7946
Mitre link : CVE-2017-7946
CVE.ORG link : CVE-2017-7946
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-416
Use After Free