In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file.
References
Link | Resource |
---|---|
https://github.com/radare/radare2/issues/12374 | Exploit Third Party Advisory |
https://github.com/radareorg/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19 | Patch Vendor Advisory |
https://github.com/radare/radare2/issues/12374 | Exploit Third Party Advisory |
https://github.com/radareorg/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/radare/radare2/issues/12374 - Exploit, Third Party Advisory | |
References | () https://github.com/radareorg/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19 - Patch, Vendor Advisory |
Information
Published : 2018-12-25 19:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20458
Mitre link : CVE-2018-20458
CVE.ORG link : CVE-2018-20458
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-125
Out-of-bounds Read