Radare2 has a division by zero vulnerability in Mach-O parser's rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service.
References
Link | Resource |
---|---|
https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 | Patch Vendor Advisory |
https://github.com/radareorg/radare2/issues/18667 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
History
13 Jul 2023, 18:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:radare:radare2:5.3.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-369 | |
First Time |
Radare radare2
Radare |
|
References | (MISC) https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 - Patch, Vendor Advisory | |
References | (MISC) https://github.com/radareorg/radare2/issues/18667 - Exploit, Issue Tracking, Patch, Vendor Advisory |
07 Jul 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-07 19:15
Updated : 2024-02-28 20:13
NVD link : CVE-2021-32494
Mitre link : CVE-2021-32494
CVE.ORG link : CVE-2021-32494
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-369
Divide By Zero