Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary.
References
Link | Resource |
---|---|
https://github.com/rizinorg/rizin/issues/2738 | Exploit Issue Tracking Third Party Advisory |
https://github.com/rizinorg/rizin/pull/2739 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/ | |
https://security.gentoo.org/glsa/202209-06 | Third Party Advisory |
https://github.com/rizinorg/rizin/issues/2738 | Exploit Issue Tracking Third Party Advisory |
https://github.com/rizinorg/rizin/pull/2739 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/ | |
https://security.gentoo.org/glsa/202209-06 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rizinorg/rizin/issues/2738 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/rizinorg/rizin/pull/2739 - Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/ - | |
References | () https://security.gentoo.org/glsa/202209-06 - Third Party Advisory |
07 Nov 2023, 03:48
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-07-27 02:15
Updated : 2024-11-21 07:09
NVD link : CVE-2022-34612
Mitre link : CVE-2022-34612
CVE.ORG link : CVE-2022-34612
JSON object : View
Products Affected
rizin
- rizin
CWE
CWE-190
Integer Overflow or Wraparound